Browse Definitions :

Browse Definitions by Alphabet

REP - RMO

  • replenishment - Replenishment is the controlled and regular movement of inventory from an upstream point on the supply chain to a downstream location that requires sufficient stock to cover demand.
  • Report on Compliance (ROC) - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
  • Report Program Generator (RPG) - RPG (Report Program Generator) is a programming language that originated as a report-building program used in DEC and IBM minicomputer operating systems and evolved into a fully procedural programming language.
  • repository - In information technology, a repository (pronounced ree-PAHZ-ih-tor-i) is a central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage.
  • reprographics - Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning, photography, xerography and digital printing.
  • reputation management - Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.
  • reputation risk - Reputation risk is the threat to the profitability or sustainability of a business or other entity that is caused by unfavorable public perception of the organization or its products or services.
  • Request for Comments (RFC) - RFC is also an abbreviation for Remote Function Call.
  • Request for Offer (RFO) - A Request for Offer (RFO) is an open and competitive purchasing process whereby an organization requests the submission of offers in response to specifications and/or a scope of services.
  • request for proposal (RFP) - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • requirements analysis (requirements engineering) - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
  • requisition - A requisition, in procurement, is a request for goods or services made by an employee to the person or department in a company that is responsible for purchasing.
  • reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
  • Reserve Bank of India (RBI) - The Reserve Bank of India (RBI) is the central banking authority of the country and dictates its monetary policy.
  • reshoring - Reshoring is the practice of bringing outsourced personnel and services back to the location from which they were originally offshored.
  • residual risk - Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.
  • Resilient File System (ReFS) - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • resistance - Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.
  • resistor - A resistor is an electrical component that limits or regulates the flow of electrical current in an electronic circuit.
  • resolution - Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera sensor.
  • resonance charging - Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer.
  • resource allocation - Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic planning goals.
  • resource contention - In computing, 'resource contention' refers to a conflict over a shared resource between several components.
  • Resource Description Framework (RDF) - The Resource Description Framework (RDF) is a general framework for representing interconnected data on the web.
  • resource-oriented architecture (ROA) - A resource-oriented architecture (ROA) is the structural design supporting the internetworking of resources.
  • Respect for People principle - Continuous Improvement (CI) and Respect for People are the two foundational principles of the Toyota Way, the company's business management guide.
  • response time - According to the IBM Dictionary of Computing (which cites International Organization for Standardization Information Technology Vocabulary as the source), response time is: The elapsed time between the end of an inquiry or demand on a computer system and the beginning of a response; for example, the length of the time between an indication of the end of an inquiry and the display of the first character of the response at a user terminal.
  • responsible AI - Responsible AI is a governance framework that documents how a specific organization is addressing the challenges around artificial intelligence (AI) from both an ethical and legal point of view.
  • Responsible AI: Executive QnA - One of the most important steps in implementing Responsible AI is to become deeply sensitive as to how an organization’s deep learning algorithms will ultimately impact real people downstream.
  • responsive design - Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST API (RESTful API) - A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
  • restricted API - A restricted API is an application program interface whose access, or use, is intentionally limited by web site developers for security purposes or business reasons.
  • restricted Boltzmann machine (RBM) - A restricted Boltzmann machine (RBM) is a type of artificial neural network (ANN) for learning probability distributions.
  • Restriction of Hazardous Substances Directive (RoHS Directive) - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • retail apocalypse - Retail apocalypse is a controversial term used by the media to describe how a shift in consumer spending patterns might be impacting the traditional brick-and-mortar retail store business model.
  • retail vs. wholesale - Retail is the sale of merchandise from a specific point (such as malls, markets and department stores) in small quantities directly to the consumer.
  • retina scan - Retina scanning is a biometric verification technology that uses an image of an individual’s retinal blood vessel pattern as a unique identifying trait for access to secure installations.
  • return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order or e-commerce merchant to permit the return of a product.
  • return on equity (ROE) - Return on equity (ROE) is a measure of a company’s financial performance that shows the relationship between a company’s profit and the investor’s return.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • reuse-oriented model or reuse-oriented development (ROD) - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • revenue attribution - Revenue attribution is the process of matching customer sales to specific advertisements in order to understand where revenue is coming from and optimize how advertising budgets are spent in the future.
  • revenue cycle management (RCM) - Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance.
  • revenue model - A revenue model is a component of a company’s business planning that describes the way it intends to make money.
  • revenue operations (RevOps) - Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.
  • Reverse Address Resolution Protocol (RARP) - Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.
  • reverse brute-force attack - A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • reverse logistics - Reverse logistics is the set of activities that is conducted after the sale of a product to recapture value and end the product's lifecycle.
  • reverse mentoring - Reverse mentoring is a management practice in which a senior employee seeks to gain business insights from a less experienced, often younger employee.
  • reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
  • RF wireless charging (RF energy harvesting) - RF wireless charging is a type of uncoupled wireless charging in which an antenna embedded in an electronic device can pick up low level radio frequency waves from external sources and convert the waves’ energy to direct current (DC) voltage.
  • RF-powered computing - RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.
  • RFC 1918 - Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks.
  • RFI (request for information) - An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.
  • RFID (radio frequency identification) - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID skimming - RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports.
  • RFID tagging - RFID tagging uses small radio frequency identification devices to track and identify objects.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFx - RFx (request for x) encompasses the entire formal request process and can include any of the following: request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
  • RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • Rich Client Platform (RCP) - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • right to be forgotten - The right to be forgotten is the concept that individuals have the civil right to request that personal information be removed from the Internet.
  • right to disconnect - Right to disconnect legislation is a body of regulations limiting the time that employers can expect employees to be available for work-related off-hours communications.
  • right to repair (electronics) - Right to repair is the legal concept that allows consumers to repair the products they buy, or choose their own service providers instead of going through the manufacturer.
  • RightScale Inc. - RightScale is a software as a service (SaaS) provider that offers cloud management and analytics tools for public, private and hybrid clouds.
  • rightsourcing - Rightsourcing is selecting the best way to procure a service and deciding whether a company is best served by performing a business requirement in-house (insourcing) or contracting it out to a third-part service provider (outsourcing).
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • RIMM - In a computer, a RIMM is a memory module developed by Kingston Technology Corp.
  • ring network - A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.
  • Ringelmann effect - The Ringelmann effect is a reduction in productivity per individual that tends to occur as the numbers of people involved in a work group increase.
  • ringtone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • Ripple - Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.
  • RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • risk assessment - Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.
  • risk assessment framework (RAF) - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk avoidance - Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.
  • risk capital - Risk capital is funds invested speculatively in a business, typically a startup.
  • risk exposure - Risk exposure is the quantified potential loss from business activities currently underway or planned.
  • risk intelligence (RQ) - Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities.
  • Risk Management Framework (RMF) - The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.
  • risk management specialist - A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.
  • risk map (risk heat map) - A risk map (risk heat map) is a data visualization tool for communicating specific risks an organization faces.
  • risk profile - A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
  • risk reporting - Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.
  • risk-based authentication (RBA) - Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised.
  • risk-based security strategy - A risk-based security strategy is one in which an organization identifies specific security precautions that should be taken in an information technology (IT) environment and documents when and where those precautions should be applied.
  • risk-reward ratio - Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss.
  • RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers use to maintain their clients' IT infrastructure and systems.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

Close