Browse Definitions :

Browse Definitions by Alphabet

ROA - WHA

  • ROADM (reconfigurable optical add-drop multiplexer) - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • roaming service - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • Robert Morris worm - The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention.
  • robo-advisor - A robo-advisor is an artificial intelligence (AI) driven virtual financial advisor.
  • robocall - A robocall is a telephone call initiated by an autodialer to deliver a prerecorded message.
  • roboethics (robot ethics) - Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • robotics - Robotics is a branch of engineering that involves the conception, design, manufacture and operation of robots.
  • robust - Robust (pronounced RO-buhst) is an adjective commonly applied in marketing literature to information technology products in several ways.
  • RoC (restart on crash) - RoC (restart on crash) is a functionality built into Windows that automatically restarts an operating system or application when it hangs, freezes or crashes.
  • Rock Phish - Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers.
  • rocker switch - A rocker switch is an on/off switch that rocks (rather than trips) when pressed, which means one side of the switch is raised while the other side is depressed much like a rocking horse rocks back and forth.
  • RODC (read-only domain controller) - A read-only domain controller (RODC) is a domain controller that hosts an Active Directory database's read-only partitions.
  • rogue employee - A rogue employee is a worker who undermines the organization that employs him by failing to comply with its business rules and policies.
  • rogue IT - Rogue IT is the use of unsanctioned information technology resources within an organization.
  • ROI (return on investment) - Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.
  • role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
  • role sharing - Role sharing occurs when an individual within a VAR or other solution provider's organization assumes multiple roles such as "sales engineer", "field engineer", "account manager" or other roles.
  • role-based access control (RBAC) - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • rolling code - Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
  • rolling forecast - A rolling forecast is a business projection that adapts for the passage of time.
  • rollout - A rollout is a staged series of activities that often accumulate meaning as they occur.
  • rollover - In creating page for a Web site, a rollover (some people call it a "mouseover") is a technique using JavaScript that lets you change a page element (usuallly a graphic image) when the user rolls the mouse over something on the page (like a line of text or a graphic image).
  • ROM emulation - ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.
  • romance scam - A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship and then attempts to get money or sensitive information from the target under various false pretenses.
  • room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
  • root cause analysis - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
  • root-mean-square (RMS) - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • rootkit - A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.
  • Roots of Trust (RoT) - Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS).
  • ROT (redundant, outdated, trivial information) - ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • round-trip time (RTT) - Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or packet to travel from a specific source to a specific destination and back again.
  • rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • router - A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.
  • routine - In computer programming, routine and subroutine are general and nearly synonymous terms for any sequence of code that is intended to be called and used repeatedly during the executable of a program.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • Rowhammer - Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent rows of memory reverse their binary state: ones turn into zeros and vice versa.
  • RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.
  • RPM Package Manager (Red-hat Package Manager) - RPM Package Manager (RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • RRAM or ReRAM (resistive RAM) - RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a specially formulated solid dielectric material.
  • RS Means - RS Means is a division of Reed Business Information that provides cost information to the construction industry so contractors in the industry can provide accurate estimates and projections for their project costs.
  • RS-232C - RS-232C is a long-established standard ("C" is the current version) that describes the physical interface and protocol for relatively low-speed serial data communication between computers and related devices.
  • RSA algorithm (Rivest-Shamir-Adleman) - The RSA algorithm (Rivest-Shamir-Adleman) is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network, such as the internet.
  • RSA Security - RSA Security is a United States-based organization that creates encryption, network and computer security products.
  • RSAT (Microsoft Remote Server Administration Tools) - RSAT (Remote Server Administration Tools) is a feature that began in Windows Server 2008 R2 to help admins remotely manage computers running Windows Server.
  • RSoP (Resultant Set of Policy) - RSoP (Resultant Set of Policy) is a report of all Group Policy settings within Active Directory that shows how those settings can affect a network.
  • RSVP (Resource Reservation Protocol) - RSVP (Resource Reservation Protocol) is a set of communication rules that allows channels or paths on the Internet to be reserved for the multicast (one source to many receivers) transmission of video and other high-bandwidth messages.
  • rsync - Rsync is a free software utility for Unix- and Linux-like systems that copies files and directories from one host to another.
  • RTA (recovery time actual) - RTA (recovery time actual) is the amount of real-world time it takes for an organization to recover its systems and business processes following an unplanned disruption; that amount of time can differ significantly from the recovery time objective (RTO), although ideally it should be the same or better.
  • Ruby - Ruby is an open source, interpreted, object-oriented programming language created by Yukihiro Matsumoto, who chose the gemstone's name to suggest "a jewel of a language.
  • Ruby on Rails (RoR or Rails) - Ruby on Rails is an open-source framework for database-backed web development in Ruby, an object-oriented programming language similar to Perl and Python.
  • rugged DevOps - Rugged DevOps is an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle.
  • rule of five (statistics) - The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
  • Rule of Least Power - The Rule of Least Power is the notion that a programmer should use the least powerful programming language required to code for a given requirement.
  • rule of thumb - A rule of thumb is a principle that is intended to provide general guidance rather than precise direction.
  • Run commands for XP and Vista - Run commands for XP and Vista.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • runlevel - A runlevel is a Linux operating state that determines which programs can execute when the operating system restarts.
  • runt - In networks, a runt is a packet that is too small.
  • runtime - Runtime is a piece of code that implements portions of a programming language's execution model.
  • runtime system - A runtime system is an engine that translates a given programming language or languages into machine code.
  • RxNorm - RxNorm is a catalog of the standard names given to clinical drugs and drug delivery devices in the United States to enable interoperability and clear communication between electronic systems, regardless of software and hardware compatibility.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • RZ (return-to-zero) - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • What is risk analysis? - Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
  • What is risk appetite? - Risk appetite is the amount of risk an organization is willing to take in pursuit of objectives it deems have value.
  • What is risk management and why is it important? - Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
  • What is risk mitigation? - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
SearchCIO
SearchHRSoftware
  • recruitment

    Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.

  • recruitment management system

    A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.

  • applicant tracking system (ATS)

    An applicant tracking system (ATS) is software that manages the recruiting and hiring process, including job postings and job ...

SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close