Browse Definitions :

Browse Definitions by Alphabet

RED - REL

  • Red Hat Satellite - Red Hat Satellite is an IT infrastructure management tool primarily used to monitor and manage Red Hat Enterprise Linux environments.
  • Red Hat Storage (RHS) - Red Hat Storage is a new distributed file system based on the Gluster file system.
  • Red Hat Virtualization (RHV) - Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.
  • red herring - A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.
  • red route - A red route is one of three categories of Internet route states defined by the Policy Analysis of Internet Routing (PAIR) project, an initiative dedicated to the development of tools that ISPs (Internet service providers), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • red screen of death - The red screen of death is a term coined by some early testers of Longhorn (the code name for Microsoft's latest Windows operating system) who, in May 2005, came across an error message appearing against an all-red display screen.
  • red team - An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners -- and with their permission -- to find security vulnerabilities that a malicious hacker could potentially exploit.
  • red team-blue team - Red team-blue team is a simulation and training exercise where members of an organization are divided into teams to compete in combative exercises.
  • red teaming - An ethical hacker, also referred to as a white hat hacker, is an information security expert who systematically attempts to penetrate a computer system, network, application or other computing resource on behalf of its owners -- and with their permission -- to find security vulnerabilities that a malicious hacker could potentially exploit.
  • red teaming - Red teaming is the practice of rigorously challenging an organization's plans, policies, systems and assumptions by applying an adversarial approach.
  • Red-hat Package Manager - RPM Package Manager (also known simply as RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • redact - To redact is to edit, or prepare for publishing.
  • redacted - To redact is to edit, or prepare for publishing.
  • redacting - To redact is to edit, or prepare for publishing.
  • redaction - To redact is to edit, or prepare for publishing.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • Redington India - Redington India is an India-based multi-national distributor of consumer electronics, home appliances, telecom, and IT products.
  • redirect - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Redis - Redis is an open source key-value database that supports various data structures.
  • Reduce reuse recycle - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • reduced instruction set computer - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • redundancy - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundant - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundant array of independent disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to protect data in the case of a drive failure.
  • redundant array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • redundant array of inexpensive disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to protect data in the case of a drive failure.
  • redundant array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • reentrant - Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.
  • refactoring - Refactoring is "the process of changing a software system in such a way that it does not alter the external behavior of the code yet improves its internal structure," according to Martin Fowler, the "father" of refactoring.
  • reference architecture - A reference architecture is a document or set of documents to which a project manager or other interested party can refer to for best practices.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • reference data - Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.
  • reference data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • Reference Information Model - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • Reference Information Model (RIM) - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • referral partner - A referral partner is a business associate who recommends a particular company and its services in exchange for something of value.
  • refresh - In a computer display, to refresh is to redraw the image information from memory.
  • refresh rate - The refresh rate is the number of times a display's image is repainted or refreshed per second.
  • ReFS - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • refurbish - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbished - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbishing - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • regex - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regin malware - Regin is a complex strain of back-door Trojan malware that uses a multi-staged, modular approach to infect its targets for the purpose of monitoring user activity and stealing data.
  • regional Bell operating company - Regional Bell operating company (RBOC) is a term describing one of the U.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional BGAN - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Regional Extension Center - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Extension Center (REC) - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Health Information Organization - A Regional Health Information Organization (RHIO) is a group of organizations within a specific geographical area that share healthcare-related information electronically according to national standards.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Internet Registry - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • Regional Internet Registry (RIR) - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of a processor, or CPU, in a computer.
  • Register of Known Spam Operations - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • Register of Known Spam Operations (ROKSO) - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • registered health information administrator - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • registered health information technician - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration admission and status - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registration authority - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • registry virtualization (Windows Vista) - Registry virtualization (RV) is a compatibility application that supports write operations in a registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • RegTech - RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.
  • regular expression - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • regular expression (regex) - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regulation Fair Disclosure (Regulation FD or Reg FD) - Regulation Fair Disclosure is a rule passed by the U.
  • Regulation of Investigatory Powers Act - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation of Investigatory Powers Act (RIPA) - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • rehome - In a Windows environment, rehoming is the process of moving public folders from one Exchange server to another.
  • rehoming - In a Windows environment, rehoming is the process of moving public folders from one Exchange server to another.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones.
  • reinforcement theory - Reinforcement theory is a psychological principle maintaining that behaviors are shaped by their consequences and that, accordingly, individual behaviors can be changed through rewards and punishments.
  • reinsurance - Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.
  • REJ - NAK is an abbreviation for negative acknowledgment or not acknowledged.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relational database management system - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • relational online analytical processing - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relational online analytical processing (ROLAP) - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • relative ID - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • relative identifier - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • relative identifier (RID) - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • RELAX NG (RELAX Next Generation) - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • release - A release is the distribution of the final version of an application.
  • release management - Release management is a software engineering process intended to oversee the development, testing, deployment and support of software releases.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • release train engineer (RTE) - A release train engineer (RTE) is an information technology (IT) professional in a large enterprise who drives continuous development initiatives while also acting as a full time chief scrum master for a Scaled Agile Framework (SAFe).
  • relentless incrementalism - Relentless incrementalism is a process in which something substantial is built through the accumulation of small but incessant additions.
  • reliability - Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close