Browse Definitions :

Browse Definitions by Alphabet

RFI - RMO

  • RFID virus - An RFID (radio-frequency identification) virus is malicious code inserted into an RFID tag to alter or corrupt data in an RFID system.
  • RFM - RFM (recency, frequency, monetary) analysis is a marketing technique used to determine which customers are the best ones by examining how often a customer buys (recency), how long it's been since their last purchase (frequency), and.
  • RFM analysis - RFM (recency, frequency, monetary) analysis is a marketing technique used to determine which customers are the best ones by examining how often a customer buys (recency), how long it's been since their last purchase (frequency), and.
  • RFM analysis (recency, frequency, monetary) - RFM (recency, frequency, monetary) analysis is a marketing technique used to determine which customers are the best ones by examining how often a customer buys (recency), how long it's been since their last purchase (frequency), and.
  • RFP - A request for proposal (RFP) is a document that an organization, often a government agency or large enterprise, posts to elicit a response -- a formal bid -- from potential vendors for a desired IT solution.
  • RFQ - A request for quotation (RFQ) is a document that an organization submits to one or more potential suppliers eliciting quotations for a product or service.
  • RFR - The Red Flags Rule (RFR) is a set of United States federal regulations that require certain businesses and organizations to develop and implement documented plans to protect consumers from identity theft.
  • RFx - RFx (request for x) encompasses the entire formal request process and can include any of the following: request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
  • RGB - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RGB (red, green, and blue) - RGB (red, green, and blue) refers to a system for representing the colors to be used on a computer display.
  • RHCVA (Red Hat Certified Virtualization Administrator) - The Red Hat Certified Virtualization Administrator (RHCVA) is a certification exam from Red Hat, Inc.
  • RHEL - Red Hat Enterprise Linux (RHEL) is a distribution of the Linux operating system developed for the business market.
  • RHIA - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
  • RHIO - A Regional Health Information Organization (RHIO) is a group of organizations within a specific geographical area that share healthcare-related information electronically according to national standards.
  • RHIT - A registered health information technician (RHIT) is a certified professional who stores and verifies the accuracy and completeness of electronic health records.
  • RIA - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • RIAA - The RIAA (Recording Industry Association of America) is an organization that represents the music recording industry's intellectual property rights.
  • RIAA (Recording Industry Association of America) - The RIAA (Recording Industry Association of America) is an organization that represents the music recording industry's intellectual property rights.
  • RIBLOE - The Remote Insight Board -- Lights Out Edition (RIBLOE) is a Peripheral Component Interconnect (PCI) card intended for the remote management of Compaq servers.
  • RIBLOE (Remote Insight Board -- Lights Out Edition) - The Remote Insight Board -- Lights Out Edition (RIBLOE) is a Peripheral Component Interconnect (PCI) card intended for the remote management of Compaq servers.
  • rich client - A rich client is a networked computer that has some resources installed locally but also depends on other resources distributed over the network.
  • Rich Client Platform - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Client Platform (RCP) - A Rich Client Platform (RCP) is a specialized computer program intended for the creation of Java applications built on the Eclipse architecture.
  • Rich Internet Application - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich media - Rich media is an Internet advertising term for a Web page ad that uses advanced technology such as streaming video, downloaded applets (programs) that interact instantly with the user, and ads that change when the user's mouse passes over it.
  • rich presence technology - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • Rich Site Summary - RSS is an XML-based vocabulary that specifies a means of sharing news headlines and other content between Web sites.
  • Rich Text Format - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • RID - In Windows 2000, the relative identifier (RID) is the part of a security ID (SID) that uniquely identifies an account or group within a domain.
  • ridge - In the biometric process of fingerscanning, a ridge is a curved line in a finger image.
  • RIFAN 2 - Reseau Internet de la Force Aeronavale etape 2 (RIFAN 2) is a secure internet developed for military applications.
  • right of use - In telecommunications, Indefeasible Right of Use (IRU) is the effective long-term lease (temporary ownership) of a portion of the capacity of an international cable.
  • right to be forgotten - The right to be forgotten is the concept that individuals have the civil right to request that personal information be removed from the Internet.
  • right to disconnect - Right to disconnect legislation is a body of regulations limiting the time that employers can expect employees to be available for work-related off-hours communications.
  • right to repair (electronics) - Right to repair is the legal concept that allows consumers to repair the products they buy, or choose their own service providers instead of going through the manufacturer.
  • rights - In the administration of a multi-user computer system, a privilege is an identified right that a particular user has to a particular system resource, such as a file folder, the use of certain system commands, or an amount of storage.
  • rights to light - A grumble line is the plotted amount of light from the sky that will be available in a building once an adjacent building has been erected.
  • RightScale Inc. - RightScale is a software as a service (SaaS) provider that offers cloud management and analytics tools for public, private and hybrid clouds.
  • rightsourcing - Rightsourcing is selecting the best way to procure a service and deciding whether a company is best served by performing a business requirement in-house (insourcing) or contracting it out to a third-part service provider (outsourcing).
  • Rijndael - Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.
  • RIM - Records information management (RIM) is a corporate area of endeavor involving the administration of all business records through their life cycle.
  • RIM - The Reference Information Model (RIM) is an information model for health care data developed by Health Level 7 International (HL7).
  • RIMM - In a computer, a RIMM is a memory module developed by Kingston Technology Corp.
  • ring - A ring is a network topology or circuit arrangement in which each device is attached along the same signal path to two other devices, forming a path in the shape of a ring.
  • ring back - Ringback is an intermittent audio tone that a caller in a telephone system hears after dialing a number, when the distant end of the circuit is receiving a ringing signal.
  • ring network - A ring network is a local area network (LAN) in which the nodes (workstations or other devices) are connected in a closed loop configuration.
  • ring tone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • ringback - Ringback is an intermittent audio tone that a caller in a telephone system hears after dialing a number, when the distant end of the circuit is receiving a ringing signal.
  • Ringelmann effect - The Ringelmann effect is a reduction in productivity per individual that tends to occur as the numbers of people involved in a work group increase.
  • ringing tone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • ringtone - On mobile phones, a ringtone is a brief audio file played to indicate an incoming call.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
  • RIP - RIP is also an abbreviation for Routing Information Protocol.
  • RIP - RIP (Routing Information Protocol) is a protocol used to enable routers to share information about IP traffic routes as they move traffic within a larger network made up of separate LANs linked through routers.
  • RIPA - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • ripping - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • Ripple - Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.
  • RIR - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • RIS - Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time from a centralized location.
  • RIS - A RIS is the traditional core software system for electronically managing medical images, scheduling and billing in hospital radiology departments and physician practices.
  • RISC - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • risk analysis - Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
  • risk appetite - Risk appetite is a concept that helps guide organizational risk management activities by allowing officials to establish a baseline level of risk an organization is prepared to accept before taking an action, as well as evaluate the likelihood and impact of certain threats.
  • risk assessment - Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.
  • risk assessment framework - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk assessment framework (RAF) - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk avoidance - Risk avoidance is the risk assessment technique that entails eliminating hazards, activities and exposures that place an organization's valuable assets at risk.
  • risk capital - Risk capital is funds invested speculatively in a business, typically a startup.
  • risk exposure - Risk exposure is a quantified loss potential of business actions, and is usually calculated based on the probability of the incident occurring multiplied by its potential losses.
  • risk intelligence (RQ) - Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities.
  • risk management - Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.
  • risk management - Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
  • risk management software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • risk map (risk heat map) - A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.
  • risk mitigation - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.
  • risk profile - A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
  • risk-based authentication (RBA) - Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised.
  • risk-based security strategy - A risk-based security strategy is one in which an organization identifies specific security precautions that should be taken in an information technology (IT) environment and documents when and where those precautions should be applied.
  • risk-reward ratio - Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss.
  • Rivest Shamir Adleman - RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.
  • Rivest-Shamir-Adleman - RSA is a cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.
  • RJ - In the U. S.
  • RJ-11 - In the U. S.
  • RJ-14 - In the U. S.
  • RJ-45 - In the U. S.
  • RJ-XX - In the U. S.
  • RJE - Remote Job Entry (RJE) is a facility that allows remote computer users to submit a job (the running of a specific program or group of programs) to a centrally-located IBM mainframe computer.
  • rlogin - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • rlogin (remote login) - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • RMA - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • RMI - RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network.
  • RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that IT service providers use to maintain their clients' IT infrastructure and systems.
  • RMON - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close