Browse Definitions :

Browse Definitions by Alphabet

REV - WHA

  • reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
  • RF wireless charging (RF energy harvesting) - RF wireless charging is a type of uncoupled wireless charging in which an antenna embedded in an electronic device can pick up low level radio frequency waves from external sources and convert the waves’ energy to direct current (DC) voltage.
  • RF-powered computing - RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.
  • RFC 1918 - Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks.
  • RFI (request for information) - An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.
  • RFID (radio frequency identification) - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID skimming - RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports.
  • RFID tagging - RFID tagging uses small radio frequency identification devices to track and identify objects.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFx - RFx (request for x) encompasses the entire formal request process and can include any of the following: request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
  • RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • risk assessment - Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.
  • risk assessment framework (RAF) - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk avoidance - Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.
  • risk exposure - Risk exposure is the quantified potential loss from business activities currently underway or planned.
  • risk intelligence (RQ) - Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities.
  • Risk Management Framework (RMF) - The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.
  • risk management specialist - A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.
  • risk map (risk heat map) - A risk map (risk heat map) is a data visualization tool for communicating specific risks an organization faces.
  • risk profile - A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
  • risk reporting - Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.
  • risk-based authentication (RBA) - Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised.
  • risk-reward ratio - Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss.
  • RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers use to maintain their clients' IT infrastructure and systems.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • ROADM (reconfigurable optical add-drop multiplexer) - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • roaming service - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • robo-advisor - A robo-advisor is an artificial intelligence (AI) driven virtual financial advisor.
  • robocall - A robocall is a telephone call initiated by an autodialer to deliver a prerecorded message.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • robotics - Robotics is a branch of engineering that involves the conception, design, manufacture and operation of robots.
  • Rock Phish - Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers.
  • rocker switch - A rocker switch is an on/off switch that rocks (rather than trips) when pressed, which means one side of the switch is raised while the other side is depressed much like a rocking horse rocks back and forth.
  • RODC (read-only domain controller) - A read-only domain controller (RODC) is a domain controller that hosts an Active Directory database's read-only partitions.
  • rogue IT - Rogue IT is the use of unsanctioned information technology resources within an organization.
  • ROI (return on investment) - Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.
  • role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
  • role-based access control (RBAC) - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • rolling code - Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
  • rolling forecast - A rolling forecast is a business projection that adapts for the passage of time.
  • room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
  • root cause analysis - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
  • root-mean-square (RMS) - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • rootkit - A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.
  • Roots of Trust (RoT) - Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS).
  • ROT (redundant, outdated, trivial information) - ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • router - A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.
  • RPM Package Manager (Red-hat Package Manager) - RPM Package Manager (RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • RRAM or ReRAM (resistive RAM) - RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a specially formulated solid dielectric material.
  • RS Means - RS Means is a division of Reed Business Information that provides cost information to the construction industry so contractors in the industry can provide accurate estimates and projections for their project costs.
  • RS-232C - RS-232C is a long-established standard ("C" is the current version) that describes the physical interface and protocol for relatively low-speed serial data communication between computers and related devices.
  • RSA algorithm (Rivest-Shamir-Adleman) - The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network, such as the internet.
  • RSA Security - RSA Security is a United States-based organization that creates encryption, network and computer security products.
  • RSAT (Microsoft Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) is a feature that began in Windows Server 2008 R2 to help admins remotely manage computers running Windows Server.
  • RSoP (Resultant Set of Policy) - RSoP (Resultant Set of Policy) is a report of all Group Policy settings within Active Directory that shows how those settings can affect a network.
  • rsync - Rsync is a free software utility for Unix- and Linux-like systems that copies files and directories from one host to another.
  • Ruby - Ruby is an open source, interpreted, object-oriented programming language created by Yukihiro Matsumoto, who chose the gemstone's name to suggest "a jewel of a language.
  • Ruby on Rails (RoR or Rails) - Ruby on Rails is an open-source framework for database-backed web development in Ruby, an object-oriented programming language similar to Perl and Python.
  • rule of five (statistics) - The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • runlevel - A runlevel is a Linux operating state that determines which programs can execute when the operating system restarts.
  • runtime - Runtime is a piece of code that implements portions of a programming language's execution model.
  • runtime system - A runtime system is an engine that translates a given programming language or languages into machine code.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • What is risk analysis? - Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
  • What is risk appetite? - Risk appetite is the amount of risk an organization is willing to take in pursuit of objectives it deems have value.
  • What is risk management and why is it important? - Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
  • What is risk mitigation? - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
SearchNetworking
  • throughput

    Throughput is a measure of how many units of information a system can process in a given amount of time.

  • traffic shaping

    Traffic shaping, also known as packet shaping, is a congestion management method that regulates network data transfer by delaying...

  • open networking

    Open networking describes a network that uses open standards and commodity hardware.

SearchSecurity
  • buffer underflow

    A buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • pen testing (penetration testing)

    A penetration test, also called a pen test or ethical hacking, is a cybersecurity technique that organizations use to identify, ...

SearchCIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
Close