Browse Definitions :

Browse Definitions by Alphabet

REQ - RIC

  • requirements engineering - Requirements analysis, also called requirements engineering, is the process of determining user expectations for a new or modified product.
  • requisition - A requisition, in procurement, is a request for goods or services made by an employee to the person or department in a company that is responsible for purchasing.
  • rescoring - Rescoring is an Agile software development process in which the development team revisits a pre-defined list of user stories to review story point scores and adjust them up or down based on what the team has learned in previous development iterations.
  • research and development (R&D) - Research and development (R&D) is the initial, exploratory stage of product and service development.
  • reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
  • Reserve Bank of India (RBI) - The Reserve Bank of India (RBI) is the central banking authority of the country and dictates its monetary policy.
  • reshoring - Reshoring is the practice of bringing outsourced personnel and services back to the location from which they were originally offshored.
  • residential construction software - Home building software, also known as residential construction software, is a collection of programs, processes and information that lets residential construction contractors manage the construction process from home design and remodeling, to cost estimates and accounting, to project management and project completion.
  • residual risk - Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.
  • Resilient File System - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • Resilient File System (ReFS) - Resilient File System (ReFS) is a file system developed by Microsoft for use on the Windows operating system (OS) that's designed to overcome some of the limitations in the New Technology File System (NTFS).
  • resistance - Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.
  • resistive RAM - RRAM or ReRAM (resistive random access memory) is a form of nonvolatile storage that operates by changing the resistance of a specially formulated solid dielectric material.
  • resistor - A resistor is an electrical component that limits or regulates the flow of electrical current in an electronic circuit.
  • resolution - In computers, resolution is the number of pixels (individual points of color) contained on a display monitor, expressed in terms of the number of pixels on the horizontal axis and the number on the vertical axis.
  • resonance charging - Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer.
  • resource allocation - Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic goals.
  • resource contention - In computing, 'resource contention' refers to a conflict over a shared resource between several components.
  • Resource Description Framework - The Resource Description Framework (RDF) is a general framework for how to describe any Internet resource such as a Web site and its content.
  • Resource Description Framework (RDF) - The Resource Description Framework (RDF) is a general framework for how to describe any Internet resource such as a Web site and its content.
  • Resource Reservation Protocol - RSVP (Resource Reservation Protocol) is a set of communication rules that allows channels or paths on the Internet to be reserved for the multicast (one source to many receivers) transmission of video and other high-bandwidth messages.
  • resource-oriented architecture (ROA) - A resource-oriented architecture (ROA) is the structural design supporting the internetworking of resources.
  • respawning cookie - A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again.
  • Respect for People principle - Continuous Improvement (CI) and Respect for People are the two foundational principles of the Toyota Way, the company's business management guide.
  • responsible AI - Responsible AI is a governance framework that documents how a specific organization is addressing the challenges around artificial intelligence (AI) from both an ethical and legal point of view.
  • Responsible AI: Executive QnA - One of the most important steps in implementing Responsible AI is to become deeply sensitive as to how an organization’s deep learning algorithms will ultimately impact real people downstream.
  • responsive design - Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.
  • REST - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST API (RESTful API) - A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
  • restricted API - A restricted API is an application program interface whose access, or use, is intentionally limited by web site developers for security purposes or business reasons.
  • restricted Boltzmann machine (RBM) - A restricted Boltzmann machine (RBM) is a type of artificial neural network (ANN) for learning probability distributions.
  • Restriction of Hazardous Substances Directive - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • Restriction of Hazardous Substances Directive (RoHS Directive) - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • Resultant Set of Policy - RSoP (Resultant Set of Policy) is a report of all Group Policy settings within Active Directory that shows how those settings can affect a network.
  • Results Only Work Environment - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • Results-Only Work Environment - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • retail apocalypse - Retail apocalypse is a controversial term used by the media to describe how a shift in consumer spending patterns might be impacting the traditional brick-and-mortar retail store business model.
  • retail vs. wholesale - Retail is the sale of merchandise from a specific point (such as malls, markets and department stores) in small quantities directly to the consumer.
  • retargeting (remarketing) - Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.
  • retina scan - Retina scanning is a biometric verification technology that uses an image of an individual’s retinal blood vessel pattern as a unique identifying trait for access to secure installations.
  • return merchandise authorization - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • return on equity (ROE) - Return on equity (ROE) is a measure of a company’s financial performance that shows the relationship between a company’s profit and the investor’s return.
  • return on investment - For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.
  • return on marketing investment - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • return to zero - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • return-to-zero - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • reuse-oriented development - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • reuse-oriented model - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • reuse-oriented model or reuse-oriented development (ROD) - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • revenue attribution - Revenue attribution is the process of matching customer sales to specific advertisements in order to understand where revenue is coming from and optimize how advertising budgets are spent in the future.
  • revenue cycle management (RCM) - Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance.
  • revenue model - A revenue model is a component of a company’s business planning that describes the way it intends to make money.
  • revenue operations (RevOps) - Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.
  • reverb - Reverb (short for reverberation) is the acoustic environment that surrounds a sound.
  • Reverse Address Resolution Protocol - RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache.
  • Reverse Address Resolution Protocol (RARP) - Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.
  • reverse brute-force attack - A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
  • reverse DNS - Reverse DNS (rDNS) is a method of resolving an IP address into a domain name, just as the domain name system (DNS) resolves domain names into associated IP addresses.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • reverse logistics - Reverse logistics is the set of activities that is conducted after the sale of a product to recapture value and end the product's lifecycle.
  • reverse mentoring - Reverse mentoring is a management practice in which a senior employee seeks to gain business insights from a less experienced, often younger employee.
  • reverse Telnet - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • reverse Telnet (direct Telnet) - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
  • RF - Radio frequency (RF) is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.
  • RF wireless charging (RF energy harvesting) - RF wireless charging is a type of uncoupled wireless charging in which an antenna embedded in an electronic device can pick up low level radio frequency waves from external sources and convert the waves’ energy to direct current (DC) voltage.
  • RF-powered computing - RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.
  • RFC - RFC is also an abbreviation for Remote Function Call.
  • RFC 1918 - Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks.
  • RFI (request for information) - An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.
  • RFID - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID (radio frequency identification) - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID hacking - An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.
  • RFID skimming - RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports.
  • RFID tagging - RFID tagging uses small radio frequency identification devices to track and identify objects.
  • RFID virus - An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.
  • RFM - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFM analysis - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFP - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • RFR - The Red Flags Rule (RFR) is a set of United States federal regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
  • RFx - RFx (request for x) encompasses the entire formal request process and can include any of the following: request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
  • RGB - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RHCVA (Red Hat Certified Virtualization Administrator) - The Red Hat Certified Virtualization Administrator (RHCVA) is a certification exam from Red Hat, Inc.
  • RHEL - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • RHIA - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIO - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • RHIT - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • RIA - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Rich Client Platform - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Client Platform (RCP) - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Internet Application - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close