Browse Definitions :

Browse Definitions by Alphabet

  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
  • robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • robotics - Robotics is a branch of engineering that involves the conception, design, manufacture and operation of robots.
  • ROI (return on investment) - Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.
  • role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
  • role-based access control (RBAC) - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character that can interact within the game's imaginary world.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
  • room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
  • root cause analysis - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
  • rootkit - A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • router - A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.
  • RPM Package Manager (Red-hat Package Manager) - RPM Package Manager (RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • RRAM or ReRAM (resistive RAM) - RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a specially formulated solid dielectric material.
  • RS Means - RS Means is a division of Reed Business Information that provides cost information to the construction industry so contractors in the industry can provide accurate estimates and projections for their project costs.
  • RS-232C - RS-232C is one of the earlier versions of the long-established standard RS-232, which defines a physical interface for relatively low-speed serial data communication between computers and related devices.
  • RSA algorithm (Rivest-Shamir-Adleman) - The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network, such as the internet.
  • RSAT (Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) refers to a set of tools from Microsoft that enable IT administrators to remotely manage roles and features in Windows Server from a computer that is running Windows 11, Windows 10 or Windows 7 Service Pack 1.
  • Ruby - Ruby is an open source, interpreted, object-oriented programming language created by Yukihiro Matsumoto, who chose the gemstone's name to suggest "a jewel of a language.
  • Ruby on Rails (RoR or Rails) - Ruby on Rails is an open-source framework for database-backed web development in Ruby, an object-oriented programming language similar to Perl and Python.
  • rule of five (statistics) - The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • runlevel - A runlevel is an operating state on a Unix and Unix-based operating system that is preset on the Linux-based system.
  • runtime - Runtime is a piece of code that implements portions of a programming language's execution model.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • What is ransomware? How it works and how to remove it - Ransomware is a type of malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
  • What is risk management and why is it important? - Risk management is the process of identifying, assessing and controlling threats to an organization's capital, earnings and operations.
  • What is risk mitigation? - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • cybersecurity

    Cybersecurity is the practice of protecting internet-connected systems such as hardware, software and data from cyberthreats.

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard (AES) is a symmetric block cipher chosen by the U.S. government to protect classified ...

CIO
HRSoftware
  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close