Browse Definitions by Alphabet
- remote infrastructure management - Remote infrastructure management, or RIM, is a comprehensive approach to handling and overseeing an organization's IT infrastructure, systems and services from a remote location.
- Remote Method Invocation (RMI) - Remote Method Invocation (RMI) is an application programming interface (API) in the Java programming language and development environment.
- remote office/branch office (ROBO) - A remote office/branch office (ROBO) is a corporate business site located at some distance from the organization's headquarters or main office.
- remote patient monitoring (RPM) - Remote patient monitoring (RPM) is a subcategory of homecare telehealth that allows patients to use mobile medical devices or technology to gather patient-generated health data (PGHD) and send it to healthcare professionals.
- Remote Procedure Call (RPC) - A Remote Procedure Call (RPC) is a software communication protocol that one program uses to request a service from another program located on a different computer and network, without having to understand the network's details.
- remote replication - Remote replication is the process of copying production data to a device at a remote location for data protection or disaster recovery purposes.
- remote sensing - Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.
- remote terminal unit (RTU) - A remote terminal unit (RTU) is a microprocessor-based electronic device used in an industrial control system (ICS) to connect hardware to a distributed control system (DCS) or supervisory control and data acquisition (SCADA) system.
- remote wipe - Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device.
- Remoting (PowerShell Remoting) - PowerShell Remoting is a feature in PowerShell that lets admins run commands on remote systems.
- removable media - Removable media is any type of storage device that can be removed from a computer while the system is running.
- rendering - In 3-D graphic design, rendering is the process of add shading, color and lamination to a 2-D or 3-D wireframe in order to create life-like images on a screen.
- replenishment - Replenishment is the controlled and regular movement of inventory from an upstream point on the supply chain to a downstream location that requires sufficient stock to cover demand.
- Report on Compliance (ROC) - A Report on Compliance (ROC) is a form that must be completed by all Level 1 Visa merchants undergoing a PCI DSS (Payment Card Industry Data Security Standard) audit.
- Request for Offer (RFO) - A Request for Offer (RFO) is a document an organization issues to solicit bids or proposals from potential suppliers for goods or services.
- requirements analysis (requirements engineering) - Requirements analysis (requirements engineering) is the process of determining user expectations for a new or modified product.
- requisition - A requisition, in procurement, is a request for goods or services made by an employee to the person or department in a company that is responsible for purchasing.
- reseller - In information technology, a reseller is a company that typically purchases IT products or services from a product manufacturer, distributor or service provider and then markets them to customers.
- reshoring - Reshoring is the process of bringing back manufacturing or production operations to their country of origin or a nearby region.
- residual risk - Residual risk is the risk that remains after efforts to identify and eliminate some or all types of risk have been made.
- Resilient File System (ReFS) - A Resilient File System (ReFS) is a file system that Microsoft developed for use on a Windows operating system (OS) and is designed to overcome some of the limitations in the New Technology File System (NTFS).
- resistance - Resistance is the opposition that a substance offers to the flow of electric current; the term contrasts with conductance, which is a measure of the ease with which current flows through a substance.
- resistor - A resistor is an electrical component that limits or regulates the flow of electrical current in an electronic circuit.
- reskilling - Reskilling is the process of teaching an employee new skills to improve proficiency in their current job or move into an advanced position.
- resolution - Resolution is the number of pixels -- picture elements or individual points of color -- that can be contained on a display screen or in a camera sensor.
- resonance charging - Resonance charging is a wireless charging method for items that require large amounts of power, such as an electric car, robot, vacuum cleaner or laptop computer.
- resource allocation - Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic planning goals.
- resource contention - In computing, 'resource contention' refers to a conflict over a shared resource between several components.
- Resource Description Framework (RDF) - The Resource Description Framework (RDF) is a general framework for representing interconnected data on the web.
- Responsible AI: Executive QnA - One of the most important steps in implementing Responsible AI is to become deeply sensitive as to how an organization’s deep learning algorithms will ultimately impact real people downstream.
- RESTful API - A RESTful API is an architectural style for an application programming interface that uses HTTP requests to access and use data.
- restore point - A system restore point is a backup copy of important Windows operating system (OS) files and settings that can be used to recover the system to an earlier point of time in the event of system failure or instability.
- Resultant Set of Policy (RSoP) - Resultant Set of Policy (RSoP) refers to all the group policies applied to a user and computer.
- Results-Only Work Environment (ROWE) - A Results-Only Work Environment (ROWE) is one in which the most important criteria for evaluating employee performance is the completion of satisfactory work on time.
- retina scan - Retina scanning is a biometric authentication technology that uses an image of an individual's retinal blood vessel pattern as a unique identifying trait for access to secure installations.
- retrieval-augmented generation - Retrieval-augmented generation (RAG) is an AI framework that retrieves data from external sources.
- Retrieval-Augmented Language Model pre-training - A Retrieval-Augmented Language Model, also referred to as REALM or RALM, is an artificial intelligence language model designed to retrieve text and then use it to perform question-based tasks.
- return merchandise authorization (RMA) - An RMA (return merchandise authorization) is a numbered authorization provided by a mail-order or e-commerce merchant to permit the return of a product.
- return on equity (ROE) - Return on equity (ROE) is a measure of a company’s financial performance that shows the relationship between a company’s profit and the investor’s return.
- return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
- revenue attribution - Revenue attribution is the process of matching customer sales to specific advertisements in order to understand where revenue is coming from and optimize how advertising budgets are spent in the future.
- revenue cycle management (RCM) - Revenue cycle management (RCM) is the financial process, utilizing medical billing software, that healthcare facilities use to track patient care episodes from registration and appointment scheduling to the final payment of a balance to ensure proper identification, collection and management of revenues from patient services.
- revenue operations (RevOps) - Revenue operations (RevOps) is the strategic integration of sales, marketing and service departments to provide a better end-to-end view to administration and management, while leaving day-to-day processes within the departments.
- Reverse Address Resolution Protocol (RARP) - Reverse Address Resolution Protocol (RARP) is a protocol a physical machine in a local area network (LAN) can use to request its IP address.
- reverse brute-force attack - A reverse brute-force attack is a type of brute-force attack in which an attacker uses a common password against multiple usernames in an attempt to gain access to a network.
- reverse logistics - Reverse logistics is the set of activities that is conducted after the sale of a product to recapture value and end the product's lifecycle.
- reverse-engineering - Reverse-engineering is the act of dismantling an object to see how it works.
- RF wireless charging (RF energy harvesting) - RF wireless charging is a type of uncoupled wireless charging in which an antenna embedded in an electronic device can pick up low level radio frequency waves from external sources and convert the waves’ energy to direct current (DC) voltage.
- RFC 1918 - Request for Comment 1918 (RFC 1918), “Address Allocation for Private Internets,” is the Internet Engineering Task Force (IETF) memorandum on methods of assigning of private IP addresses on TCP/IP networks.
- RFI (request for information) - An RFI (request for information) is a formal process for gathering information from potential suppliers of a good or service.
- RFID (radio frequency identification) - RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
- RFID tagging - RFID tagging uses small radio frequency identification devices to track and identify objects.
- RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
- RFx - RFx (request for x) encompasses the entire formal request process and can include request for bid (RFB), request for information (RFI), request for proposal (RFP), request for quotation (RFQ) and request for tender (RFT).
- RGB (red, green and blue) - RGB (red, green and blue) refers to a system representing the colors used on a digital display screen.
- RHIA (Registered Health Information Administrator) - An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient health information, including analyzing that data.
- rich communication services (RCS) - Rich communications services (RCS) is a communication technology protocol that provides enhanced, or "rich," capabilities for messaging, voice, video and file transfer.
- Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
- rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
- Rich Text Format (RTF) - Rich Text Format (RTF) is a file format that lets you exchange text files between different word processors in different operating systems.
- RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
- Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
- RISC (reduced instruction set computer) - RISC (reduced instruction set computer) is a microprocessor that is designed to perform a smaller number of computer instruction types, so it can operate at a higher speed, performing more millions of instructions per second, or MIPS.
- risk analysis - Risk analysis is the process of identifying and analyzing potential issues that could negatively impact key business initiatives or projects.
- risk appetite - Risk appetite is the amount of risk an organization or investor is willing to take in pursuit of objectives it deems have value.
- risk assessment - Risk assessment is the process of identifying hazards that could negatively affect an organization's ability to conduct business.
- risk assessment framework (RAF) - A risk assessment framework (RAF) is a strategy for prioritizing and sharing information about the security risks to an information technology (IT) infrastructure.
- risk avoidance - Risk avoidance is the elimination of hazards, activities and exposures that can negatively affect an organization and its assets.
- risk exposure - Risk exposure is the quantified potential loss from business activities currently underway or planned.
- Risk Management Framework (RMF) - The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.
- risk management specialist - A risk management specialist is a role appointed within organizations to identify potential risks that might negatively affect the business.
- risk map (risk heat map) - A risk map (risk heat map) is a data visualization tool for communicating specific risks an organization faces.
- risk profile - A risk profile is a quantitative analysis of the types of threats an organization, asset, project or individual faces.
- risk reporting - Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.
- risk-based authentication (RBA) - Risk-based authentication (RBA) is an authentication method in which varying levels of stringency are applied to a system’s authentication process based on the likelihood that access to that system could result in its compromise.
- risk-based patch management (RBPM) - Risk-based patch management (RBPM) is an approach to implementing patches to fix software code that prioritizes patches that address security issues posing the highest risk to the organization.
- risk-based vulnerability management (RBVM) - Risk-based vulnerability management (RBVM) is an approach to identifying and addressing security vulnerabilities in an organization's IT environment that prioritizes remediating vulnerabilities that pose the greatest risk.
- RMM software (remote monitoring and management software) - RMM software (remote monitoring and management software) is a type of application that information technology (IT) service providers and departments use to maintain their clients' and business organizations' IT assets, infrastructure and systems.
- RMON (Remote Network Monitoring) - RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of distributed local area networks (LANs) and interconnecting T-1/E-1 and T-2/E-3 lines from a central site.
- ROADM (reconfigurable optical add-drop multiplexer) - An ROADM (reconfigurable optical add-drop multiplexer) is a device that can add, block, pass or redirect modulated infrared (IR) and visible light beams of various wavelengths in a fiber optic network.
- Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
- robo-advisor - A robo-advisor is a virtual financial advisor powered by artificial intelligence (AI) that employs an algorithm to deliver an automated selection of financial advisory services.
- robocall - Robocalls are automated telephone calls that deliver a recorded message.
- robot - A robot is a machine designed to execute one or more tasks automatically with speed and precision.
- robot economy - The robot economy is a scenario in which most of the labor required to sustain human life is automated.
- robotic process automation (RPA) - Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, repeatable tasks.
- robotic surgery (robot-assisted surgery) - Robotic surgery is the use of computer technologies working in conjunction with robot systems to perform medical procedures.
- role mining - Role mining is the process of analyzing user-to-resource mapping data to determine or modify user permissions for role-based access control (RBAC) in an enterprise.
- role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character that can interact within the game's imaginary world.
- rolling deployment - A rolling deployment is the installation of software updates on one server or server subset at a time, rather than updating all servers or server subsets at the same time.
- room-scale virtual reality (VR) - Room-scale (or roomscale) virtual reality (VR) is the use of clear space to allow movement for someone using a VR application such as a VR game.
- root cause analysis - Root cause analysis (RCA) is a method for understanding the underlying cause of an observed or experienced incident.
- rootkit - A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system.
- round robin - A round robin is an arrangement of choosing all elements in a group equally in some rational order, usually from the top to the bottom of a list and then starting again at the top of the list and so on.
- rounding error - Rounding error is the difference between a rounded-off numerical value and the actual value.
- route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
- router - A router is a physical or virtual appliance that passes information between two or more packet-switched computer networks.
- Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
- routing table - A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
- RPC over HTTP - Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP.