Browse Definitions :

Browse Definitions by Alphabet

RES - RIO

  • Results-Only Work Environment - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
  • retail apocalypse - Retail apocalypse is a controversial term used by the media to describe how a shift in consumer spending patterns might be impacting the traditional brick-and-mortar retail store business model.
  • retail vs. wholesale - Retail is the sale of merchandise from a specific point (such as malls, markets and department stores) in small quantities directly to the consumer.
  • retargeting - Retargeting is a type of online advertising whereby companies focus on particular audience members for promotions based on users' prior Internet search history or site visits.
  • retargeting (remarketing) - Retargeting, also known as remarketing, is advertising that features specific products or services and targets an individual who has viewed them online.
  • retina scan - Retina scanning is a biometric verification technology that uses an image of an individual’s retinal blood vessel pattern as a unique identifying trait for access to secure installations.
  • retractable e-mail - Self-destructing email is electronic mail that vanishes or becomes unreadable after a certain length of time or upon the request of the sender.
  • return merchandise authorization - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • return on equity (ROE) - Return on equity (ROE) is a measure of a company’s financial performance that shows the relationship between a company’s profit and the investor’s return.
  • return on investment - For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.
  • return on marketing investment - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • return to zero - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • return-to-zero - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • retweet - A retweet (RT) is the repetition of another user's update, or tweet, on Twitter.
  • reuse-oriented development - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • reuse-oriented model - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • reuse-oriented model or reuse-oriented development (ROD) - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • revenue attribution - Revenue attribution is the process of matching customer sales to specific advertisements in order to understand where revenue is coming from and optimize how advertising budgets are spent in the future.
  • revenue cycle management (RCM) - Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance.
  • revenue model - A revenue model is a component of a company’s business planning that describes the way it intends to make money.
  • revenue operations (RevOps) - Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.
  • revenue recognition - Revenue recognition is a tenet of corporate financial management that defines when a company officially accounts for revenue.
  • reverb - Reverb (short for reverberation) is the acoustic environment that surrounds a sound.
  • reverberation - Reverb (short for reverberation) is the acoustic environment that surrounds a sound.
  • Reverse Address Resolution Protocol - RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache.
  • Reverse Address Resolution Protocol (RARP) - RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server's Address Resolution Protocol (ARP) table or cache.
  • reverse brute-force attack - A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
  • reverse DNS - Reverse DNS (rDNS) is a method of resolving an IP address into a domain name, just as the domain name system (DNS) resolves domain names into associated IP addresses.
  • reverse image search - Reverse image search is a technology that takes an image file as a search engine input query and returns results related to the image.
  • reverse logistics - Reverse logistics is the set of activities that is conducted after the sale of a product, such as servicing, refurbishment and recycling, for the purpose of recapturing value or proper disposal.
  • reverse mentoring - Reverse mentoring is a management practice in which a senior employee seeks to gain business insights from a less experienced, often younger employee.
  • reverse Telnet - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • reverse Telnet (direct Telnet) - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
  • rewritable DVD - Recordable DVD (sometimes called writable DVD) is a DVD technology that allows a PC user to write data one or more times to a DVD with the PC's DVD drive.
  • rewriteable CD - CD-RW (for compact disc, rewriteable) is a compact disc (CD) format that allows repeated recording on a disc.
  • RF - Radio frequency (RF) is a measurement representing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 GHz to as low as 9 kHz.
  • RF wireless charging (RF energy harvesting) - RF wireless charging is a type of uncoupled wireless charging in which an antenna embedded in an electronic device can pick up low level radio frequency waves from external sources and convert the waves’ energy to direct current (DC) voltage.
  • RF-powered computing - RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.
  • RFC - RFC is also an abbreviation for Request for Comments.
  • RFC - RFC is also an abbreviation for Remote Function Call.
  • RFC 1918 - Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks.
  • RFI (request for information) - An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.
  • RFID - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID (radio frequency identification) - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
  • RFID hacking - An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.
  • RFID skimming - RFID skimming is the wireless interception of information from RFID chip-based debit, credit and ID cards and other documents, such as passports.
  • RFID tagging - RFID tagging uses small radio frequency identification devices to track and identify objects.
  • RFID virus - An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.
  • RFM - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFM analysis - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • RFP - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • RFQ - A request for quotation (RFQ) is a document that an organization submits to one or more potential suppliers eliciting quotations for a product or service.
  • RFR - The Red Flags Rule (RFR) is a set of United States federal regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
  • RFx - RFx (request for x) encompasses the entire formal request process and can include any of the following: request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
  • RGB - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RHCVA (Red Hat Certified Virtualization Administrator) - The Red Hat Certified Virtualization Administrator (RHCVA) is a certification exam from Red Hat, Inc.
  • RHEL - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • RHIA - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIO - A Regional Health Information Organization (RHIO) is a group of organizations within a specific area that share healthcare-related information electronically according to accepted healthcare information technology (HIT) standards.
  • RHIT - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • RIA - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • RIAA - The RIAA (Recording Industry Association of America) is an organization that represents the music recording industry's intellectual property rights.
  • RIBLOE - The Remote Insight Board -- Lights Out Edition (RIBLOE) is a Peripheral Component Interconnect (PCI) card intended for the remote management of Compaq servers.
  • Rich Client Platform - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Client Platform (RCP) - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Internet Application - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Site Summary - RSS is an XML-based vocabulary that specifies a means of sharing news headlines and other content between Web sites.
  • Rich Text Format - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • RID - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • RIFAN 2 - Reseau Internet de la Force Aeronavale etape 2 (RIFAN 2) is a secure internet developed for military applications.
  • right of use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • right to be forgotten - The right to be forgotten is the concept that individuals have the civil right to request that personal information be removed from the Internet.
  • right to disconnect - Right to disconnect legislation is a body of regulations limiting the time that employers can expect employees to be available for work-related off-hours communications.
  • right to repair (electronics) - Right to repair is the legal concept that allows consumers to repair the products they buy, or choose their own service providers instead of going through the manufacturer.
  • rights - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
  • RightScale Inc. - RightScale is a software as a service (SaaS) provider that offers cloud management and analytics tools for public, private and hybrid clouds.
  • rightsourcing - Rightsourcing is selecting the best way to procure a service and deciding whether a company is best served by performing a business requirement in-house (insourcing) or contracting it out to a third-part service provider (outsourcing).
  • Rijndael - Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.
  • RIM - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • RIM - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • RIMM - In a computer, a RIMM is a memory module developed by Kingston Technology Corp.
  • ring back - Ringback is an intermittent audio tone that a caller in a telephone system hears after dialing a number, when the distant end of the circuit is receiving a ringing signal.
  • ring network - A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.
  • ring tone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • Ringelmann effect - The Ringelmann effect is a reduction in productivity per individual that tends to occur as the numbers of people involved in a work group increase.
  • ringing tone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • ringtone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close