Browse Definitions :

Browse Definitions by Alphabet

RED - REM

  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundancy - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundant - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundant array of independent disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure.
  • redundant array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • redundant array of inexpensive disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure.
  • redundant array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • refactoring - Refactoring is the process of restructuring code, while not changing its original functionality.
  • reference architecture - A reference architecture is a document or set of documents to which a project manager or other interested party can refer to for best practices.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • reference data - Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.
  • reference data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • Reference Information Model - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • Reference Information Model (RIM) - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • referral partner - A referral partner is a business associate who recommends a particular company and its services in exchange for something of value.
  • refresh - In a computer display, to refresh is to redraw the image information from memory.
  • refresh rate - The refresh rate is the number of times a display's image is repainted or refreshed per second.
  • ReFS - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • refurbish - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbished - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbishing - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • regex - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regin malware - Regin is a complex strain of back-door Trojan malware that uses a multi-staged, modular approach to infect its targets for the purpose of monitoring user activity and stealing data.
  • regional Bell operating company - Regional Bell operating company (RBOC) is a term describing one of the U.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional BGAN - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Regional Extension Center - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Extension Center (REC) - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Health Information Organization - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Internet Registry - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of the computer processor.
  • Register of Known Spam Operations - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • registered health information administrator - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • registered health information technician - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration admission and status - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registration authority - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • registry virtualization (Windows Vista) - Registry virtualization (RV) is a compatibility application that supports write operations in a registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • RegTech - RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.
  • regular expression - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • regular expression (regex) - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regulation Fair Disclosure (Regulation FD or Reg FD) - Regulation Fair Disclosure is a rule passed by the U.
  • Regulation of Investigatory Powers Act - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation of Investigatory Powers Act (RIPA) - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • rehome - In a Windows environment, rehoming is the process of moving public folders from one Exchange server to another.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones.
  • reinforcement theory - Reinforcement theory is a psychological principle maintaining that behaviors are shaped by their consequences and that, accordingly, individual behaviors can be changed through rewards and punishments.
  • reinsurance - Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.
  • REJ - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relational database management system - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • relational online analytical processing - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relational online analytical processing (ROLAP) - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • relative ID - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • relative identifier - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • RELAX Next Generation - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG (RELAX Next Generation) - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • release - A release is the distribution of the final version of an application.
  • release management - Release management is a software engineering process intended to oversee the development, testing, deployment and support of software releases.
  • release plan - In agile software development, a release plan is an evolving flowchart that describes which features will be delivered in upcoming releases.
  • release train engineer (RTE) - A release train engineer (RTE) is an information technology (IT) professional in a large enterprise who drives continuous development initiatives while also acting as a full time chief scrum master for a Scaled Agile Framework (SAFe).
  • relentless incrementalism - Relentless incrementalism is a process in which something substantial is built through the accumulation of small but incessant additions.
  • reliability - Reliability is an attribute of any computer-related component (software, or hardware, or a network, for example) that consistently performs according to its specifications.
  • Reliability Availability and Serviceability - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • Reliability, Availability and Serviceability (RAS) - Reliability, Availability and Serviceability (RAS) is a set of related attributes that must be considered when designing, manufacturing, purchasing or using a computer product or component.
  • reliable array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • reliable array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • remote access - Remote access is the ability for an authorized person to access a computer or a network from a geographical distance through a network connection.
  • remote access server - Remote access is the ability for an authorized person to access a computer or a network from a geographical distance through a network connection.
  • Remote Access Server Application Program Interface - RAS API (Remote Access Server Application Program Interface) is an application program interface (API) in Microsoft Windows 95/98/NT systems that supports remote access for users with dial-up connections.
  • Remote Access server role - Remote Access is a server role in Microsoft Windows Server 2012 and Windows Server 2012 R2 and offers administrators a central point for administering, configuring and monitoring factors related to network access.
  • remote access Trojan - A remote access Trojan (RAT) is a malware program that gives an intruder administrative control over a target computer.
  • Remote Authentication Dial In User Service - Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • Remote Authentication Dial-In User Service - Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service.
  • remote backup - Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.
  • remote clustering - WAN clustering, also called geoclustering, high-availability clustering or remote clustering, is the use of multiple redundant computing resources located in different geographical locations to form what appears to be a single highly-available system.
  • remote code execution (RCE) - Remote code execution is a security vulnerability that allows an attacker to execute codes from a remote server.
  • Remote Data Objects - RDO (Remote Data Objects) is an application program interface (API) from Microsoft that lets programmers writing Windows applications get access to and from both Microsoft and other database providers.
  • remote deposit capture - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote desktop connection broker - A remote desktop connection broker allows clients to access various types of server-hosted desktops and applications.
  • Remote Desktop Connection Manager (RDCMan) - Remote Desktop Connection Manager (RDCMan) is a tool that enables information technology (IT) administrators to organize, group and control remote desktop connections.
  • Remote Desktop Protocol - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • remote desktop protocol (RDP) - Remote desktop protocol (RDP) is a secure network communications protocol from Microsoft.
  • Remote Desktop Services - Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.
  • Remote Desktop Services (RDS) - Remote Desktop Services (RDS) is an umbrella term for several specific features of Microsoft Windows Server that allow users to remotely access graphical desktops and Windows applications.
  • Remote Desktop Session Host (RDSH) - Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS).
  • Remote Direct Memory Access - Remote Direct Memory Access (RDMA) is a technology that allows computers in a network to exchange data in main memory without involving the processor, cache or OS.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close