Browse Definitions :

Browse Definitions by Alphabet

RIP - ROL

  • RIP - RIP is also an abbreviation for Routing Information Protocol.
  • RIP - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • RIPA - RIPA (Regulation of Investigatory Powers Act) is a law enacted in the United Kingdom in 2000 to govern the interception and use of electronic communications.
  • ripping - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • ripping (digital extraction) - Ripping, more formally known as digital extraction, is the process of copying audio or video content from a compact disc, DVD or streaming media onto a computer hard drive.
  • Ripple - Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.
  • RIR - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • RIS - Remote Installation Service (RIS) is a feature included in Microsoft's Windows 2000 server that allows network administrators to install the Windows 2000 Professional operating system and its upgrades to any number of client computers at one time from a centralized location.
  • RIS - A RIS is the traditional core software system for electronically managing medical images, scheduling and billing in hospital radiology departments and physician practices.
  • RISC - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of types of computer instructions so that it can operate at a higher speed (perform more millions of instructions per second, or MIPS).
  • risk appetite - In business, risk appetite is the level of risk an organization is prepared to accept.
  • risk assessment - Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.
  • risk assessment framework - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk assessment framework (RAF) - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
  • risk avoidance - Risk avoidance is the risk assessment technique that entails eliminating hazards, activities and exposures that place an organization's valuable assets at risk.
  • risk capital - Risk capital is funds invested speculatively in a business, typically a startup.
  • risk exposure - Risk exposure is a quantified loss potential of business actions, and is usually calculated based on the probability of the incident occurring multiplied by its potential losses.
  • risk intelligence (RQ) - Risk intelligence (RQ) is a term used to describe predictions made around uncertainties and future threat probabilities.
  • risk management - Enterprise risk management (ERM) is the process of planning, organizing, leading, and controlling the activities of an organization in order to minimize the effects of risk on an organization's capital and earnings.
  • risk management - Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.
  • Risk Management Framework (RMF) - The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.
  • risk management software - GRC (governance, risk management and compliance) software allows publicly-held companies to integrate and manage IT operations that are subject to regulation.
  • risk map (risk heat map) - A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.
  • risk profile - A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
  • risk-based authentication (RBA) - Risk-based authentication (RBA) is a method of applying varying levels of stringency to authentication processes based on the likelihood that access to a given system could result in its being compromised.
  • risk-based security strategy - A risk-based security strategy is one in which an organization identifies specific security precautions that should be taken in an information technology (IT) environment and documents when and where those precautions should be applied.
  • risk-reward ratio - Risk-reward ratio is a formula used to measure the expected gains of a given investment against the risk of loss.
  • Rivest Shamir Adleman - The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.
  • Rivest-Shamir-Adleman - The RSA algorithm is the basis of a cryptosystem -- a suite of cryptographic algorithms that are used for specific security services or purposes -- which enables public key encryption and is widely used to secure sensitive data, particularly when it is being sent over an insecure network such as the internet.
  • RJ - In the U. S.
  • RJ-11 - In the U. S.
  • RJ-14 - In the U. S.
  • RJ-45 - In the U. S.
  • RJ-XX - In the U. S.
  • RJE - Remote Job Entry (RJE) is a facility that allows remote computer users to submit a job (the running of a specific program or group of programs) to a centrally-located IBM mainframe computer.
  • rlogin - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • rlogin (remote login) - Rlogin (remote login) is a UNIX command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
  • RMA - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order merchant to permit the return of a product.
  • RMI - RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network.
  • RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers use to maintain their clients' IT infrastructure and systems.
  • RMON - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • rms - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • RNAAPP - RNAAPP (Remote Network Access Application) is one of those occasionally visible yet mysterious little programs that come with the Microsoft Windows 95/98 operating system.
  • RNIS - RNIS (Reseau Numerique a Integration de Services) is the European name for Integrated Services Digital Network (ISDN).
  • ROADM - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • ROADM (reconfigurable optical add-drop multiplexer) - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • roam - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • roaming - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • roaming service - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • Robert Morris worm - The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention.
  • robo-advisor - A robo-advisor is an artificial intelligence (AI) driven virtual financial advisor.
  • robocall - A robocall is a telephone call initiated by an autodialer to deliver a prerecorded message.
  • roboethics (robot ethics) - Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.
  • robojournalism - Robojournalism is the use of software programs to generate articles, reports and other types of content.
  • robot - A bot (short for 'robot' and also called an internet bot) is a computer program that operates as an agent to either simulate a human activity or for a user or another program.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot blimp - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
  • Robot Land - Robot Land is a proposed city for robotics research, development, testing and production in South Korea.
  • robot tax - Robot tax is a proposition that employers who replace employees with automated workers be required to pay a tax and the funds allocated to assist the displaced workforce.
  • robotic dirigible - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • robotic vacuum - Roomba is the name of a robotic vacuum produced by iRobot Corporation of Burlington, Mass.
  • robotics - Robotics is a branch of engineering that involves the conception, design, manufacture and operation of robots.
  • robotics quotient - Robotics quotient (RQ) is a way of scoring humans’ ability to work effectively with robots, just as intelligence quotient (IQ) tests provide a score that helps gauge human cognitive abilities.
  • robots.txt - Robots.txt is a text file used on websites to provide instructions to webcrawlers or “robots” that index pages for search engines.
  • robust - Robust (pronounced RO-buhst) is an adjective commonly applied in marketing literature to information technology products in several ways.
  • ROC - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS audit.
  • RoC (restart on crash) - RoC (restart on crash) is a functionality built into Windows that automatically restarts an operating system or application when it hangs, freezes or crashes.
  • Rock Phish - Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers.
  • rocker switch - A rocker switch is an on/off switch that rocks (rather than trips) when pressed, which means one side of the switch is raised while the other side is depressed much like a rocking horse rocks back and forth.
  • ROD - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • RODC (read-only domain controller) - A read-only domain controller (RODC) is a domain controller that hosts an Active Directory database's read-only partitions.
  • rogue employee - A rogue employee is a worker who undermines the organization that employs him by failing to comply with its business rules and policies.
  • rogue IT - Rogue IT is the use of unsanctioned information technology resources within an organization.
  • RoHS - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • RoHS Directive - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • ROI - For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.
  • ROI (return on investment) - Return on investment, or ROI, is a mathematical formula that investors can use to evaluate their investments and judge how well a particular investment has performed compared to others.
  • ROKSO - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • ROLAP - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • role based access control - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
  • role playing game - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • role sharing - Role sharing occurs when an individual within a VAR or other solution provider's organization assumes multiple roles such as "sales engineer", "field engineer", "account manager" or other roles.
  • role-based access control - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-based access control (RBAC) - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-playing game - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • roll back - A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.
  • rollable display - A rollable display is a digital screen technology that can be rolled up like a newspaper.
  • rollback - A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.
  • rolling code - Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email virus

    An email virus consists of malicious code distributed in email messages to infect one or more devices.

  • key fob

    A key fob is a small, programmable device that provides access to a physical object.

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • JBOD (just a bunch of disks)

    JBOD, which stands for 'just a bunch of disks,' is a type of multilevel configuration for disks.

  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

Close