Browse Definitions :

Browse Definitions by Alphabet

RUB - WHA

  • rubric - A rubric is a scoring tool used to evaluate and assess a set list of criteria and objectives.
  • Ruby - Ruby is an open source, interpreted, object-oriented programming language created by Yukihiro Matsumoto, who chose the gemstone's name to suggest "a jewel of a language.
  • Ruby on Rails - Ruby on Rails is an open-source framework for database-backed web development in Ruby, an object-oriented programming language similar to Perl and Python.
  • Ruby on Rails (RoR or Rails) - Ruby on Rails is an open-source framework for database-backed web development in Ruby, an object-oriented programming language similar to Perl and Python.
  • rugged DevOps - Rugged DevOps is an approach to software development that places a priority on ensuring that code is secure at all stages of the software development lifecycle.
  • rugged IT - Rugged IT is a marketing term for hardware that is designed to operate in extremely harsh environments and conditions.
  • rule of five (statistics) - The rule of five is a rule of thumb in statistics that estimates the median of a population by choosing a random sample of five from that population.
  • Rule of Least Power - The Rule of Least Power is the notion that a programmer should use the least powerful programming language required to code for a given requirement.
  • rule of thumb - A rule of thumb is a principle that is intended to provide general guidance rather than precise direction.
  • run book - In a computer system or network, a run book is a written set of procedures for the routine and exceptional operation of the system or network by an administrator or operator.
  • Run commands for XP and Vista - Run commands for XP and Vista.
  • runbook - In a computer system or network, a run book is a written set of procedures for the routine and exceptional operation of the system or network by an administrator or operator.
  • runlevel - A runlevel is a Linux operating state that determines which programs can execute when the operating system restarts.
  • running disparity - Running disparity (RD or rd) is the difference between the number of logic 1 bits and logic 0 bits between the start of a data sequence and a particular instant in time during its transmission.
  • runtime - Runtime is when a program is running (or being executable).
  • runtime application self-protection (RASP) - Runtime application self-protection (RASP) is security software that monitors application inputs and behavior and takes action to deal with suspicious events automatically or, if necessary, alert an administrator.
  • runtime system - A runtime system is an engine that translates a given programming language or languages into machine code.
  • RUP - Rational Unified Process (RUP) is an object-oriented and Web-enabled program development methodology.
  • RWU - Remote wakeup (RWU) is a general term for the powering-up of (turning on) a computer over a network.
  • RxNorm - RxNorm is a catalog of the standard names given to clinical drugs and drug delivery devices in the United States to enable interoperability and clear communication between electronic systems, regardless of software and hardware compatibility.
  • Ryzen (AMD Ryzen) - Ryzen (pronounced RYE zen) is an AMD CPU aimed at the server, desktop, workstation, media center PC and all-in-one markets.
  • RZ - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • RZ (return-to-zero) - RZ (return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by voltage pulses having certain characteristics.
  • What is risk analysis? - Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
  • What is risk mitigation? - Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • security policy

    A security policy is a document that states in writing how a company plans to protect its physical and information technology (IT...

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close