Browse Definitions :

Browse Definitions by Alphabet

RED - REL

  • Red Hat Enterprise Linux (RHEL) - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • Red Hat Linux - Red Hat is a leading software company in the business of assembling open source components for the Linux operating system and related programs into a distribution package that can easily be ordered and implemented.
  • Red Hat Mobile Application Platform - Red Hat Mobile Application Platform is a software development framework that enables organizations to extend their development capabilities to mobile by developing collaboratively, centralizing control of security and using back-end integration with a range of cloud deployments.
  • Red Hat OpenShift - Red Hat OpenShift is a multifaceted, open source container application platform from Red Hat Inc.
  • Red Hat OpenStack Platform - Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and manage large pools of compute, storage and networking resources in public and private clouds.
  • Red hat Package Manager - RPM Package Manager (also known simply as RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • Red Hat Satellite - Red Hat Satellite is an IT infrastructure management tool primarily used to monitor and manage Red Hat Enterprise Linux environments.
  • Red Hat Storage (RHS) - Red Hat Storage is a new distributed file system based on the Gluster file system.
  • Red Hat Virtualization (RHV) - Red Hat Virtualization (RHV) is an enterprise-class virtualization platform produced by Red Hat.
  • red herring - A red herring is a logical fallacy in which irrelevant information is presented alongside relevant information, distracting attention from that relevant information.
  • red screen of death - The red screen of death is a term coined by some early testers of Longhorn (the code name for Microsoft's latest Windows operating system) who, in May 2005, came across an error message appearing against an all-red display screen.
  • red team - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • red team-blue team - Red team-blue team is a simulation and training exercise in which members of the same organization are divided into two teams that compete against each other in combative exercises.
  • red teaming - An ethical hacker, or white hat hacker, is an information security expert authorized by an organization to penetrate computing infrastructure to find security vulnerabilities a malicious hacker could exploit.
  • red teaming - Red teaming is the practice of rigorously challenging plans, policies, systems and assumptions by adopting an adversarial approach.
  • Red-hat Package Manager - RPM Package Manager (also known simply as RPM), originally called the Red-hat Package Manager, is a program for installing, uninstalling, and managing software packages in Linux.
  • redacted - To redact is to edit, or prepare for publishing.
  • redacting - To redact is to edit, or prepare for publishing.
  • redaction - To redact is to edit, or prepare for publishing.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • Redington India - Redington India is an India-based multi-national distributor of consumer electronics, home appliances, telecom, and IT products.
  • redirect - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Redis - Redis is an open source key-value database that supports various data structures.
  • Reduce reuse recycle - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • Reduce, reuse, recycle (R3) - Reduce, reuse and recycle (R3) are the three essential components of environmentally-responsible consumer behavior.
  • reduced instruction set computer - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • redundancy - Redundancy is a system design in which a component is duplicated so if it fails there will be a backup.
  • redundancy - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundant - Redundancy can have several meanings, but commonly refers to spare hardware that is kept online or to duplicate data.
  • redundant array of independent disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure.
  • redundant array of independent nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • redundant array of inexpensive disks - RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or solid-state drives to protect data in the case of a drive failure.
  • redundant array of inexpensive nodes - RAIN (also called channel bonding, redundant array of independent nodes, reliable array of independent nodes, or random array of independent nodes) is a cluster of nodes connected in a network topology with multiple interfaces and redundant storage, providing fault tolerance and graceful degradation.
  • reentrant - Reentrant is an adjective that describes a computer program or routine that is written so that the same copy in memory can be shared by multiple users.
  • refactoring - Refactoring is "the process of changing a software system in such a way that it does not alter the external behavior of the code yet improves its internal structure," according to Martin Fowler, the "father" of refactoring.
  • reference architecture - A reference architecture is a document or set of documents to which a project manager or other interested party can refer to for best practices.
  • reference checking software - Reference checking software is programming that automates the process of contacting and questioning the references of job applicants.
  • reference data - Reference data, in the context of data management, are the data objects relevant to transactions, consisting of sets of values, statuses or classification schema.
  • reference data - Fixed data (sometimes referred to as permanent data) is data that is not, under normal circumstances, subject to change.
  • Reference Information Model - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • Reference Information Model (RIM) - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • referral partner - A referral partner is a business associate who recommends a particular company and its services in exchange for something of value.
  • refresh - In a computer display, to refresh is to redraw the image information from memory.
  • refresh rate - The refresh rate is the number of times a display's image is repainted or refreshed per second.
  • ReFS - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • refurbish - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbished - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • refurbishing - Refurbish, in everyday language, is "to renew or to restore to a new condition and/or appearance".
  • regex - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regin malware - Regin is a complex strain of back-door Trojan malware that uses a multi-staged, modular approach to infect its targets for the purpose of monitoring user activity and stealing data.
  • regional Bell operating company - Regional Bell operating company (RBOC) is a term describing one of the U.
  • regional Bell operating company (RBOC) - Regional Bell operating company (RBOC) is a term describing one of the U.
  • Regional BGAN - BGAN (Broadband Global Area Network) is a mobile communications system created to transmit broadband wireless voice and data communications almost anywhere on the earth's surface.
  • Regional Extension Center - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Extension Center (REC) - A Regional Extension Center (REC) is an organization that has received funding under the Health Information Technology for Economic and Clinical Health Act (HITECH Act) to assist health care providers with the selection and implementation of electronic health record (EHR) technology.
  • Regional Health Information Organization - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Health Information Organization (RHIO) - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • Regional Internet Registry - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • Regional Internet Registry (RIR) - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • register (processor register, CPU register) - A processor register is one of a small set of data holding places that are part of the computer processor.
  • Register of Known Spam Operations - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • Register of Known Spam Operations (ROKSO) - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • registered health information administrator - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • registered health information technician - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered health information technician (RHIT) - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration admission and status - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registration authority - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration authority (RA) - A registration authority (RA) is an authority in a network that verifies user requests for a digital certificate and tells the certificate authority (CA) to issue it.
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • registry key - In the Windows 98, CE, NT, and 2000 operating systems, a registry key is an organizational unit in the Windows registry.
  • registry virtualization (Windows Vista) - Registry virtualization (RV) is a compatibility application that supports write operations in a registry.
  • regression testing - Regression testing is a type of software test that assesses if changes to an application, or other related software components, introduce defects.
  • RegTech - RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of regulatory compliance.
  • regular expression - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • regular expression (regex) - A regular expression (sometimes abbreviated to "regex") is a way for a computer user or programmer to express how a computer program should look for a specified pattern in text and then what the program is to do when each pattern match is found.
  • Regulation Fair Disclosure (Regulation FD or Reg FD) - Regulation Fair Disclosure is a rule passed by the U.
  • Regulation of Investigatory Powers Act - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation of Investigatory Powers Act (RIPA) - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • Regulation SCI (Regulation Systems Compliance and Integrity) - Regulation SCI is a set of compliance rules designed by the SEC to monitor and regulate the technology infrastructure of U.
  • regulatory compliance - Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business processes.
  • rehome - In a Windows environment, rehoming is the process of moving public folders from one Exchange server to another.
  • rehoming - In a Windows environment, rehoming is the process of moving public folders from one Exchange server to another.
  • reinforcement learning - Reinforcement learning is a machine learning training method based on rewarding desired behaviors and/or punishing undesired ones.
  • reinforcement theory - Reinforcement theory is a psychological principle maintaining that behaviors are shaped by their consequences and that, accordingly, individual behaviors can be changed through rewards and punishments.
  • reinsurance - Reinsurance protects insurers against excessive losses, helping to ensure their sustainability and prevent bankruptcy and failure as a business.
  • REJ - NAK is an abbreviation for negative acknowledgment or not acknowledged.
  • relational database - A relational database is a collection of information that organizes data points with defined relationships for easy access.
  • relational database management system - A relational database management system (RDBMS) is a collection of programs and capabilities that enable IT teams and others to create, update, administer and otherwise interact with a relational database.
  • relational online analytical processing - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relational online analytical processing (ROLAP) - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • relationship marketing - Relationship marketing is a customer relationship management strategy designed to encourage strong, lasting customer connections to a brand.
  • relative ID - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • relative identifier - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • relative identifier (RID) - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • RELAX Next Generation - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
  • RELAX NG (RELAX Next Generation) - RELAX NG (RELAX Next Generation) is a deliberately simple and straightforward XML markup language for metadocument data, aka schemas, developed in response to the W3C XML Schema standard.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close