Browse Definitions :

Browse Definitions by Alphabet

REG - REQ

  • regular expression (regex) - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regulation Fair Disclosure (Regulation FD or Reg FD) - Regulation Fair Disclosure is a rule passed by the U.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones.
  • reinforcement theory - Reinforcement theory is a psychological principle maintaining that behaviors are shaped by their consequences and that, accordingly, individual behaviors can be changed through rewards and punishments.
  • reinsurance - Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.
  • REJ - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relational database management system - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • relational online analytical processing - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relational online analytical processing (ROLAP) - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • relative identifier - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • RELAX Next Generation - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG (RELAX Next Generation) - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • release - A release is the distribution of the final version of an application.
  • release management - Release management is a software engineering process intended to oversee the development, testing, deployment and support of software releases.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • release train engineer (RTE) - A release train engineer (RTE) is an information technology (IT) professional in a large enterprise who drives continuous development initiatives while also acting as a full time chief scrum master for a Scaled Agile Framework (SAFe).
  • relentless incrementalism - Relentless incrementalism is a process in which something substantial is built through the accumulation of small but incessant additions.
  • reliability - Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.
  • Reliability Availability and Serviceability - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • reliable array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • reliable array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • remote access - Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.
  • remote access server - Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a network connection.
  • Remote Access server role - Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.
  • remote access Trojan - A remote access Trojan (RAT) is a malware program that gives an intruder administrative control over a target computer.
  • Remote Authentication Dial In User Service - RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • Remote Authentication Dial-In User Service - RADIUS (Remote Authentication Dial-In User Service) is a client-server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • remote code execution (RCE) - Remote code execution is a security vulnerability that allows an attacker to execute codes from a remote server.
  • remote deposit capture - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop connection broker - A remote desktop connection broker allows clients to access various types of server-hosted desktops and applications.
  • Remote Desktop Connection Manager (RDCMan) - Remote Desktop Connection Manager (RDCMan) is a tool that enables information technology (IT) administrators to organize, group and control remote desktop connections.
  • Remote Desktop Protocol - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Remote Desktop Services - Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.
  • Remote Desktop Services (RDS) - Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • Remote Direct Memory Access - Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without relying on the processor, cache or operating system of either computer.
  • Remote Direct Memory Access (RDMA) - Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without relying on the processor, cache or operating system of either computer.
  • remote display protocol - A remote display protocol is a special set of data transfer rules that makes it possible for a desktop hosted at one place to display on a client's screen at another location.
  • Remote DMA - Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without relying on the processor, cache or operating system of either computer.
  • remote hands - Remote hands is the general name for a service offered by colocation providers that enables customers to delegate IT management and maintenance tasks in a colocation facility to technicians hired by the provider.
  • Remote Installation Service - Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time from a centralized location.
  • Remote Installation Service (RIS) - Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time from a centralized location.
  • remote keyless entry (RKE) - Remote keyless entry (RKE) is an electronic access system that can be controlled from a distance.
  • remote login - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • Remote Method Invocation - RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network.
  • Remote Method Invocation (RMI) - RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network.
  • Remote Network Monitoring - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • remote office/branch office (ROBO) - A ROBO is a smaller office than the company headquarters and located in another town, state or country.
  • remote patient monitoring - Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.
  • remote patient monitoring (RPM) - Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.
  • Remote Procedure Call - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.
  • Remote Procedure Call (RPC) - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.
  • Remote Python Call (RPyC) - A remote python call (RPyC) is a type of remote procedure call that allows an administrator to use the universality of Python programming language to manage a remote object as if it were local.
  • remote replication - Remote replication is the process of copying production data to a device at a remote location for data protection or disaster recovery purposes.
  • remote sensing - Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.
  • remote server management - Remote server management is a market segment that includes products and services that enable IT professionals to monitor and control data centers from offsite.
  • remote terminal unit (RTU) - A remote terminal unit (RTU) is a microprocessor-based electronic device used in industrial control systems (ICS) to connect various hardware to distributed control systems (DCS) or supervisory control and data acquisition (SCADA).
  • remote wake-up - Remote wakeup (RWU) is a general term for the powering-up of (turning on) a computer over a network.
  • remote wakeup - Remote wakeup (RWU) is a general term for the powering-up of (turning on) a computer over a network.
  • remote wakeup (RWU) - Remote wakeup (RWU) is a general term for the powering-up of (turning on) a computer over a network.
  • remote wipe - Remote wipe is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.
  • RemoteFX - RemoteFX is a set of protocols for Microsoft's Remote Desktop Protocol (RDP) that are used to remotely deliver Windows virtual desktops over a local area network (LAN).
  • Remoting (PowerShell Remoting) - PowerShell Remoting is a feature in PowerShell that lets admins run commands on remote systems.
  • removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
  • rendering - In 3-D graphic design, rendering is the process of add shading, color and lamination to a 2-D or 3-D wireframe in order to create life-like images on a screen.
  • rendundant array of independent disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives (SSDs) to protect data in the case of a drive failure.
  • reorganization (reorg) - Reorganization, in a business context, is an overhaul of a company's internal structure.
  • reparse point - A reparse point is an object in a file system with attributes that activate extended functionality.
  • repeat unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
  • repeatable process - A repeatable process is a set of actions that allow for a more efficient use of limited resources and reduce unwanted variation during the development and implementation of various projects.
  • repeater - In digital communication systems, a repeater is a device that receives a digital signal on an electromagnetic or optical transmission medium and regenerates the signal along the next leg of the medium.
  • repetitive manufacturing - Repetitive manufacturing (REM) is the means of production planning and control used to produce goods and materials in a repetitive manner.
  • replenishment - Replenishment refers to the movement of inventory from upstream -- or reserve -- product storage locations to downstream -- or primary – storage, picking and shipment locations.
  • replicate - Replication (pronounced rehp-lih-KA-shun) is the process of making a replica (a copy) of something.
  • replication - Replication (pronounced rehp-lih-KA-shun) is the process of making a replica (a copy) of something.
  • Report on Compliance - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
  • Report on Compliance (ROC) - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
  • Report Program Generator - RPG (Report Program Generator) is a programming language that originated as a report-building program used in DEC and IBM minicomputer operating systems and evolved into a fully procedural programming language.
  • Report Program Generator (RPG) - RPG (Report Program Generator) is a programming language that originated as a report-building program used in DEC and IBM minicomputer operating systems and evolved into a fully procedural programming language.
  • repository - In information technology, a repository (pronounced ree-PAHZ-ih-tor-i) is a central place in which an aggregation of data is kept and maintained in an organized way, usually in computer storage.
  • representational state transfer - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • reprographics - Reprographics is a blanket term encompassing multiple methods of reproducing content, such as scanning, photography, xerography and digital printing.
  • reputation management - Reputation management is the practice of attempting to shape public perception of a person or organization by influencing online information about that entity.
  • reputation risk - Reputation risk is the threat to the profitability or sustainability of a business or other entity that is caused by unfavorable public perception of the organization or its products or services.
  • Request for Comments - RFC is also an abbreviation for Remote Function Call.
  • Request for Comments (RFC) - RFC is also an abbreviation for Remote Function Call.
  • Request for Offer (RFO) - A Request for Offer (RFO) is an open and competitive purchasing process whereby an organization requests the submission of offers in response to specifications and/or a scope of services.
  • request for proposal - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • request for proposal (RFP) - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • requirements analysis - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
  • requirements analysis (requirements engineering) - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close