Browse Definitions :

Browse Definitions by Alphabet

RED - REV

  • Red Hat Virtualization (RHV) - Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.
  • red herring - A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.
  • red teaming - Red teaming is the practice of rigorously challenging plans, policies, systems and assumptions by adopting an adversarial approach.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundant - Data redundancy refers to the practice of keeping data in two or more places within a database or data storage system.
  • refactoring - Refactoring is the process of restructuring code, while not changing its original functionality.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • referral partner - A referral partner is a business associate who recommends a particular company and its services in exchange for something of value.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of the computer processor.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • RegTech - RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.
  • Regulation Fair Disclosure (Regulation FD or Reg FD) - Regulation Fair Disclosure is a rule passed by the U.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones.
  • reinforcement theory - Reinforcement theory is a psychological principle suggesting that behaviors are shaped by their consequences, and that individual behaviors can be changed accordingly through reinforcement, punishment and extinction.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • release - A release is the distribution of the final version or the newest version of a software application.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • release train engineer (RTE) - A release train engineer (RTE) is an information technology (IT) professional in a large enterprise who drives continuous development initiatives while also acting as a full time chief scrum master for a Scaled Agile Framework (SAFe).
  • reliability - Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • remote access - Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.
  • Remote Access server role - Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.
  • remote code execution (RCE) - Remote code execution is a security vulnerability that allows an attacker to execute codes from a remote server.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop connection broker - A remote desktop connection broker allows clients to access various types of server-hosted desktops and applications.
  • Remote Desktop Connection Manager (RDCMan) - Remote Desktop Connection Manager (RDCMan) is a free Microsoft tool that enables IT administrators to organize, group and control multiple remote desktop connections.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Remote Desktop Services (RDS) - Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • Remote Direct Memory Access (RDMA) - Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without relying on the processor, cache or operating system of either computer.
  • remote display protocol - A remote display protocol is a special set of data transfer rules that makes it possible for a desktop hosted at one place to display on a client's screen at another location.
  • remote hands - Remote hands is the general name for a service offered by colocation providers that enables customers to delegate IT management and maintenance tasks in a colocation facility to technicians hired by the provider.
  • remote keyless entry (RKE) - Remote keyless entry (RKE) is an electronic access system that can be controlled from a distance.
  • Remote Method Invocation (RMI) - RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network.
  • remote office/branch office (ROBO) - A ROBO is a smaller office than the company headquarters and located in another town, state or country.
  • remote patient monitoring (RPM) - Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.
  • Remote Procedure Call (RPC) - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.
  • remote sensing - Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.
  • remote terminal unit (RTU) - A remote terminal unit (RTU) is a microprocessor-based electronic device used in industrial control systems (ICS) to connect various hardware to distributed control systems (DCS) or supervisory control and data acquisition (SCADA).
  • remote wipe - Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.
  • Remoting (PowerShell Remoting) - PowerShell Remoting is a feature in PowerShell that lets admins run commands on remote systems.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • rendering - In 3-D graphic design, rendering is the process of add shading, color and lamination to a 2-D or 3-D wireframe in order to create life-like images on a screen.
  • reorganization (reorg) - Reorganization, in a business context, is an overhaul of a company's internal structure.
  • reparse point - A reparse point is an object in a file system with attributes that activate extended functionality.
  • repeatable process - A repeatable process is a set of actions that allow for a more efficient use of limited resources and reduce unwanted variation during the development and implementation of various projects.
  • repeater - In digital communication systems, a repeater is a device that receives a digital signal on an electromagnetic or optical transmission medium and regenerates the signal along the next leg of the medium.
  • repetitive manufacturing - Repetitive manufacturing (REM) is the means of production planning and control used to produce goods and materials in a repetitive manner.
  • replenishment - Replenishment is the controlled and regular movement of inventory from an upstream point on the supply chain to a downstream location that requires sufficient stock to cover demand.
  • Report on Compliance (ROC) - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
  • repository - In information technology, a repository (pronounced ree-PAHZ-ih-tor-i) is a central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage.
  • reprographics - Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning, photography, xerography and digital printing.
  • Request for Comments (RFC) - A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
  • Request for Offer (RFO) - A Request for Offer (RFO) is an open and competitive purchasing process whereby an organization requests the submission of offers in response to specifications and/or a scope of services.
  • request for proposal (RFP) - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • requirements analysis (requirements engineering) - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
  • requisition - A requisition, in procurement, is a request for goods or services made by an employee to the person or department in a company that is responsible for purchasing.
  • reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
  • reshoring - Reshoring is the practice of bringing outsourced personnel and services back to the location from which they were originally offshored.
  • residual risk - Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.
  • Resilient File System (ReFS) - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • resistance - Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.
  • resistor - A resistor is an electrical component that limits or regulates the flow of electrical current in an electronic circuit.
  • resolution - Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera sensor.
  • resonance charging - Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer.
  • resource allocation - Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic planning goals.
  • resource contention - In computing, 'resource contention' refers to a conflict over a shared resource between several components.
  • Resource Description Framework (RDF) - The Resource Description Framework (RDF) is a general framework for representing interconnected data on the web.
  • Respect for People principle - Continuous Improvement (CI) and Respect for People are the two foundational principles of the Toyota Way, the company's business management guide.
  • responsible AI - Responsible AI is a governance framework that documents how a specific organization is addressing the challenges around artificial intelligence (AI) from both an ethical and legal point of view.
  • Responsible AI: Executive QnA - One of the most important steps in implementing Responsible AI is to become deeply sensitive as to how an organization’s deep learning algorithms will ultimately impact real people downstream.
  • responsive design - Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST API (RESTful API) - A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
  • restricted API - A restricted API is an application program interface whose access, or use, is intentionally limited by web site developers for security purposes or business reasons.
  • Restriction of Hazardous Substances Directive (RoHS Directive) - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • retina scan - Retina scanning is a biometric verification technology that uses an image of an individual’s retinal blood vessel pattern as a unique identifying trait for access to secure installations.
  • return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order or e-commerce merchant to permit the return of a product.
  • return on equity (ROE) - Return on equity (ROE) is a measure of a company’s financial performance that shows the relationship between a company’s profit and the investor’s return.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • revenue attribution - Revenue attribution is the process of matching customer sales to specific advertisements in order to understand where revenue is coming from and optimize how advertising budgets are spent in the future.
  • revenue cycle management (RCM) - Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance.
  • revenue operations (RevOps) - Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.
  • Reverse Address Resolution Protocol (RARP) - Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.
  • reverse brute-force attack - A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • reverse logistics - Reverse logistics is the set of activities that is conducted after the sale of a product to recapture value and end the product's lifecycle.
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close