Browse Definitions :

Browse Definitions by Alphabet

REC - REG

  • rechargeable battery - Rechargeable batteries allow for multiple usages from a cell, reducing waste and generally providing a better long-term investment in terms of dollars spent for usable device time.
  • reciprocal meter - The reciprocal meter is the standard unit of wave number for electromagnetic fields (EM fields).
  • recommendation engine - Recommendation engines are common among online retail websites, such as Amazon.
  • reconfigurable optical add drop multiplexer - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • reconfigurable optical add-drop multiplexer - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • reconfigurable tactile display - A reconfigurable tactile display (RTD) is a control interface that provides physical touch input, but that can be configured by programming.
  • reconfigurable tactile display (RTD) - A reconfigurable tactile display (RTD) is a control interface that provides physical touch input, but that can be configured by programming.
  • record - In computer data processing, a record is a collection of data items arranged for processing by a program.
  • record standardization - In data management, record standardization is a process in which files are first parsed (assigned to appropriate fields in a database record) and then translated to a common format.
  • records information management - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • records information management (RIM) - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • records management - Records management (RM) is the administration of records and documented information for the entirety of its lifecycle, which includes creation, maintenance, use, storage, retrieval and disposal.
  • records retention schedule - A records retention schedule is a policy that depicts how long data items must be kept, as well as the disposal guidelines for these data items.
  • recovery point objective - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system or network goes down as a result of a hardware, program or communications failure.
  • recovery point objective (RPO) - The recovery point objective (RPO) is the age of files that must be recovered from backup storage for normal operations to resume if a computer, system or network goes down as a result of a hardware, program or communications failure.
  • recovery time objective - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
  • recovery time objective (RTO) - The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network or application can be down after a failure or disaster occurs.
  • recruitment - Recruitment is the process of finding, screening, hiring and eventually onboarding qualified job candidates.
  • recruitment management system - A recruitment management system (RMS) is a set of tools designed to manage the recruiting process.
  • recruitment marketing - Recruitment marketing is the combination of strategies and tools used by an organization to engage and nurture potential talent in the pre-applicant phase.
  • recruitment process outsourcing (RPO) - Recruitment process outsourcing (RPO) involves an employer turning the responsibility of finding potential job candidates over to a third-party service provider.
  • rectangular coordinates - Cartesian coordinates, also called rectangular coordinates, provide a method of rendering graphs and indicating the positions of points on a two-dimensional (2D) surface or in three-dimensional (3D) space.
  • recurrent neural networks - A recurrent neural network (RNN) is a type of artificial neural network commonly used in speech recognition and natural language processing.
  • recursive acronym - An acronym (pronounced AK-ruh-nihm, from Greek acro- in the sense of extreme or tip and onyma or name) is an abbreviation of several words in such a way that the abbreviation itself forms a word.
  • recursive DNS query - A recursive DNS query is a request from a client for a website that must be responded to with either the sought response or an error message stating that the site does not exist.
  • recursive DNS server - A recursive DNS server is a domain name system server that takes website name or URL (uniform resource locator) requests from users and checks the records attained from authoritative DNS servers for the associated IP address.
  • recycling - Recycling is the practice of reusing items that would otherwise be discarded as waste.
  • Red Flags Rule - The Red Flags Rule (RFR) is a set of United States federal regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
  • Red Flags Rule (RFR) - The Red Flags Rule (RFR) is a set of United States federal regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
  • red green blue - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • Red Hat - Red Hat is a software company that combines open source Linux operating system components with related programs into a distribution package that customers can order.
  • Red Hat Atomic Host - Red Hat Atomic Host is a variant of the Red Hat Enterprise Linux supported, open source operating system, designed to be a minimal OS with optimizations for container hosting.
  • Red Hat Certified Cloud Provider - A Red Hat Certified Cloud Provider is a member in the company's cloud partner program that has met requirements to offer Red Hat products and services in a cloud computing environment.
  • Red Hat Cloud Partner Program - The Red Hat Cloud Partner Program is an initiative offering Red Hat certification for cloud providers.
  • Red Hat Enterprise Linux - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • Red Hat Enterprise Linux (RHEL) - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • Red Hat Linux - Red Hat is a leading software company in the business of assembling open source components for the Linux operating system and related programs into a distribution package that can easily be ordered and implemented.
  • Red Hat Mobile Application Platform - Red Hat Mobile Application Platform is a software development framework that enables organizations to extend their development capabilities to mobile by developing collaboratively, centralizing control of security and using back-end integration with a range of cloud deployments.
  • Red Hat OpenShift - Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc.
  • Red Hat OpenStack Platform - Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and manage large pools of compute, storage and networking resources in public and private clouds.
  • Red hat Package Manager - RPM Package Manager (also known simply as RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • Red Hat Satellite - Red Hat Satellite is an IT infrastructure management tool primarily used to monitor and manage Red Hat Enterprise Linux environments.
  • Red Hat Storage (RHS) - Red Hat Storage is a new distributed file system based on the Gluster file system.
  • Red Hat Virtualization (RHV) - Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.
  • red herring - A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.
  • red team - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • red team-blue team - Red team-blue team is a simulation and training exercise in which members of the same organization are divided into two teams that compete against each other in combative exercises.
  • red teaming - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • red teaming - Red teaming is the practice of rigorously challenging plans, policies, systems and assumptions by adopting an adversarial approach.
  • Red-hat Package Manager - RPM Package Manager (also known simply as RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • redirect - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Redis - Redis is an open source key-value database that supports various data structures.
  • Reduce reuse recycle - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • reduced instruction set computer - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundancy - Data redundancy refers to the practice of keeping data in two or more places within a database or data storage system.
  • redundant - Data redundancy refers to the practice of keeping data in two or more places within a database or data storage system.
  • redundant array of independent disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
  • redundant array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • redundant array of inexpensive disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
  • redundant array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • refactoring - Refactoring is the process of restructuring code, while not changing its original functionality.
  • reference architecture - A reference architecture is a document or set of documents to which a project manager or other interested party can refer to for best practices.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • reference data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • reference data - Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.
  • Reference Information Model - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • Reference Information Model (RIM) - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • referral partner - A referral partner is a business associate who recommends a particular company and its services in exchange for something of value.
  • refresh - In a computer display, to refresh is to redraw the image information from memory.
  • refresh rate - The refresh rate is the number of times a display's image is repainted or refreshed per second.
  • ReFS - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • refurbish - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbished - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbishing - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • regex - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • regional Bell operating company - Regional Bell operating company (RBOC) is a term describing one of the U.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional BGAN - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Regional Extension Center - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Extension Center (REC) - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Health Information Organization - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of the computer processor.
  • registered health information administrator - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • registered health information technician - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration admission and status - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registration authority - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • RegTech - RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.
  • regular expression - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close