Browse Definitions :

Browse Definitions by Alphabet

RMO - ROU

  • RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
  • rms - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • RNAAPP - RNAAPP (Remote Network Access Application) is one of those occasionally visible yet mysterious little programs that come with the Microsoft Windows 95/98 operating system.
  • Rnext - Rnext was the unofficial name given to a then forthcoming release of IBM's Notes and Domino product set.
  • RNIS - RNIS (Reseau Numerique a Integration de Services) is the European name for Integrated Services Digital Network (ISDN).
  • RNIS (Reseau Numerique a Integration de Services) - RNIS (Reseau Numerique a Integration de Services) is the European name for Integrated Services Digital Network (ISDN).
  • ROADM (reconfigurable optical add-drop multiplexer) - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
  • roam - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • roaming - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • roaming service - Roaming service is the ability to get access to the Internet when away from home at the price of a local call or at a charge considerably less than the regular long-distance charges.
  • Robert Metcalfe - Robert Melancton Metcalfe is a United States engineer and inventor born April 7, 1946 who has credits in co-creating the internet, Ethernet, 3Com, and the self-named Metcalfe’s law.
  • Robert Morris worm - The Robert Morris worm is widely acknowledged as the first computer worm to be distributed across the Internet and the first computer virus to receive mainstream media attention.
  • ROBO backup (remote data backup) - ROBO backup is the process of copying and archiving data created by remote and branch offices (ROBOs) and storing it securely.
  • robo-advisor - A robo-advisor is an artificial intelligence (AI) driven virtual financial advisor.
  • robocall - A robocall is a telephone call initiated by an autodialer to deliver a prerecorded message.
  • roboethics (robot ethics) - Roboethics (robot ethics) is the area of study concerned with what rules should be created for robots to ensure their ethical behavior and how to design ethical robots.
  • robojournalism - Robojournalism is the use of software programs to generate articles, reports and other types of content.
  • Robokoneko - The Robokoneko was a proposed robot kitten (robot + Japanese ko for "child" + neko for "cat") that was intended to have a remote computer brain containing "neural net" modules that could evolve their intelligence based on experience and prearranged rules.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot - A bot (short for "robot") is a program that operates as an agent for a user or another program or simulates a human activity.
  • robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
  • robot blimp - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
  • Robot Ethics Charter - The Robot Ethics Charter is a proposed set of rules intended to govern the interaction between humans and robot s.
  • robot kitten - The Robokoneko was a proposed robot kitten (robot + Japanese ko for "child" + neko for "cat") that was intended to have a remote computer brain containing "neural net" modules that could evolve their intelligence based on experience and prearranged rules.
  • Robot Land - Robot Land is a proposed city for robotics research, development, testing and production in South Korea.
  • robot tax - Robot tax is a proposition that employers who replace employees with automated workers be required to pay a tax and the funds allocated to assist the displaced workforce.
  • robotic dirigible - A Stratellite is a rigid framed airship that hovers in a fixed position in the lower stratosphere and carries one or more repeaters to create wireless communication networks.
  • robotic personality - Robotic personality is an advanced aspect of artificial intelligence (AI) in which smart machines display idiosyncratic human behavior.
  • robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
  • robotic vacuum - Roomba is the name of a robotic vacuum produced by iRobot Corporation of Burlington, Mass.
  • robotics - Robotics is a branch of engineering that involves the conception, design, manufacture, and operation of robots.
  • robotics quotient - Robotics quotient (RQ) is a way of scoring humans’ ability to work effectively with robots, just as intelligence quotient (IQ) tests provide a score that helps gauge human cognitive abilities.
  • robots.txt - Robots.txt is a text file used on websites to provide instructions to webcrawlers or “robots” that index pages for search engines.
  • Robson - Robson is a mass storage system similar to a hybrid hard drive (HHD).
  • robust - Robust (pronounced RO-buhst) is an adjective commonly applied in marketing literature to information technology products in several ways.
  • ROC - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS audit.
  • RoC (restart on crash) - RoC (restart on crash) is a functionality built into Windows that automatically restarts an operating system or application when it hangs, freezes or crashes.
  • Rock Phish - Rock Phish is both a phishing toolkit and the entity that publishes the kit, either a hacker, or, more likely, a sophisticated group of hackers.
  • rocker switch - A rocker switch is an on/off switch that rocks (rather than trips) when pressed, which means one side of the switch is raised while the other side is depressed much like a rocking horse rocks back and forth.
  • Rocket eBook - Rocket eBook is a portable reading device about the size of a paperback book that promises to be the first usable, mass-marketed "electronic book.
  • ROD - The reuse-oriented model, also called reuse-oriented development (ROD), is a method of software development in which a program is refined by producing a sequence of prototypes called models, each of which is automatically derived from the preceding one according to a sequence of defined rules.
  • RODC (read-only domain controller) - A read-only domain controller (RODC) is a domain controller that hosts an Active Directory database's read-only partitions.
  • rogue - In general, a rogue is someone who strays from the accepted path, is mischievous, or is a cheat.
  • rogue employee - A rogue employee is a worker who undermines the organization that employs him by failing to comply with its business rules and policies.
  • rogue IT - Rogue IT is the use of unsanctioned information technology resources within an organization.
  • RoHS - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • RoHS Directive - The Restriction of Hazardous Substances (RoHS) Directive is a set of criteria formulated by the European Union (EU) to regulate the use of toxic materials in electrical and electronic devices, systems, and toys.
  • ROI - For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.
  • ROI (return on investment) - For a given use of money in an enterprise, the ROI (return on investment) is how much profit or cost saving is realized as a result.
  • ROKSO - The Register of Known Spam Operations (ROKSO) is a list of over 500 professional spammers that is maintained by the Spamhaus Project, an organization dedicated to identifying and exposing spam operators.
  • ROLAP - Relational online analytical processing (ROLAP) is a form of online analytical processing (OLAP) that performs dynamic multidimensional analysis of data stored in a relational database rather than in a multidimensional database (which is usually considered the OLAP standard).
  • role based access control - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
  • role playing game - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • role sharing - Role sharing occurs when an individual within a VAR or other solution provider's organization assumes multiple roles such as "sales engineer", "field engineer", "account manager" or other roles.
  • role-based access control - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-based access control (RBAC) - Role-based access control (RBAC) is a method of restricting network access based on the roles of individual users within an enterprise.
  • role-playing game - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • roll back - A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.
  • rollable display - A rollable display is a digital screen technology that can be rolled up like a newspaper.
  • rollback - A rollback is the undoing of partly completed database changes when a database transaction is determined to have failed.
  • rolling code - Rolling code, also known as hopping code, is an encryption technique commonly used to provide a fresh code for each use of a passive keyless entry (PKE) system.
  • rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
  • rolling forecast - A rolling forecast is a business projection that adapts for the passage of time.
  • rollout - A rollout is a staged series of activities that often accumulate meaning as they occur.
  • rollover - In creating page for a Web site, a rollover (some people call it a "mouseover") is a technique using JavaScript that lets you change a page element (usuallly a graphic image) when the user rolls the mouse over something on the page (like a line of text or a graphic image).
  • rollover ad - A rollover ad is an online advertisement that appears to be a static image until rollover activates it.
  • Rollyo - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • ROM - ROM is "built-in" computer memory containing data that normally can only be read, not written to.
  • ROM emulation - ROM emulation is the process of copying data from a ROM (read-only memory) chip to a storage medium such as a hard disk or flash memory.
  • romance scam - A romance scam is a fraudulent scheme in which a swindler pretends romantic interest in a target, establishes a relationship and then attempts to get money or sensitive information from the target under various false pretenses.
  • ROMI - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • room-scale VR (room-scale virtual reality) - Room-scale VR (room-scale virtual reality) is the use of a clear space to allow movement for someone using a VR application such as virtual reality gaming.
  • Roomba - Roomba is the name of a robotic vacuum produced by iRobot Corporation of Burlington, Mass.
  • Roomba (robotic vacuum) - Roomba is the name of a robotic vacuum produced by iRobot Corporation of Burlington, Mass.
  • root cause analysis - Root cause analysis is a way to determine how a problematic event occurred by examining why, how and when the casual factors happened after the fact.
  • root directory - In a computer file system that is organized as a hierarchy or tree, the root directory is the directory that includes all other directories.
  • root mean square - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • root partition - A root partition is the isolated area in a Microsoft Hyper-V environment where the hypervisor runs.
  • root server system - On the Internet, the root server system is the way that an authoritative master list of all top-level domain names (such as com, net, org,and individual country codes) is maintained and made available to all routers.
  • root-mean-square - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • root-mean-square (RMS) - In a direct current (DC) circuit, voltage or current is simple to define, but in an alternating current (AC) circuit, the definition is more complicated, and can be done in several ways.
  • rootkit - A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system.
  • rootkits - A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system.
  • Roots of Trust (RoT) - Roots of Trust (RoT) is a set of functions in the trusted computing module that are always trusted by the computer’s operating system (OS).
  • RosettaNet - RosettaNet is an organization set up by leading information technology companies to define and implement a common set of standards for e-business.
  • ROT (redundant, outdated, trivial information) - ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value.
  • ROT-13 - ROT-13 is the encrypting of a message by exchanging each of the letters on the first half of the alphabet with the corresponding letter in the second half of the alphabet (that is, swapping positions by 13 characters).
  • rotational acceleration - Angular acceleration, also called rotational acceleration, is a quantitative expression of the change in angular velocity that a spinning object undergoes per unit time.
  • rotational velocity - Angular velocity, also called rotational velocity, is a quantitative expression of the amount of rotation that a spinning object undergoes per unit time.
  • rotoscoping - For either broadcast video or Internet streaming video, rotoscoping is the rotated projection of a sequence of usually photographed action image frames so that the artist can trace from the frame or create an image to superimpose on it.
  • round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
  • round trip time - Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or packet to travel from a specific source to a specific destination and back again.
  • round-trip delay - Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or packet to travel from a specific source to a specific destination and back again.
  • round-trip time - Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or packet to travel from a specific source to a specific destination and back again.
  • round-trip time (RTT) - Round-trip time (RTT), also called round-trip delay, is the time required for a signal pulse or packet to travel from a specific source to a specific destination and back again.
  • rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
  • RoundTable - Microsoft RoundTable is a videoconference device designed to simulate in-person meetings.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close