R
Radar Chart
A graphical method of displaying multivariate data in the form of a two-dimensional chart of three or more quantitative variables represented on axes starting from the same point.
aiRainbow Table Attack
A type of attack used to crack password hashes by using pre-computed tables of hashes for every possible password.
securityRandom Access Memory(RAM)
A type of computer memory that can be read and changed in any order, typically used to store working data and machine code.
hardwareRandom Forest
An ensemble learning method that operates by constructing a multitude of decision trees during training and outputting the average prediction of the individual trees.
aiRandom Sampling
A sampling technique where each member of the population has an equal chance of being selected.
aiRandom Search
A hyperparameter optimization technique that selects random combinations of hyperparameters to train and evaluate models.
aiRansomware
A type of malware that threatens to publish or block access to data unless a ransom is paid.
securityReact
A popular JavaScript library for building user interfaces, particularly single-page applications, using a component-based architecture.
webReactive Programming
A declarative programming paradigm concerned with data streams and the propagation of change.
devReAct Prompting(ReAct)
A prompting technique that combines 'Reasoning' and 'Acting,' allowing an LLM to generate reasoning traces and task-specific actions in an interleaved manner.
aiRead-Only Memory(ROM)
A type of non-volatile memory used in computers and other electronic devices that cannot be easily modified.
hardwareRead Replica
A copy of a primary database instance that can be used to serve read-only traffic, improving performance and scalability.
cloudReassembly
The process of putting fragmented IP packets back together into their original form at the destination device.
networkRecall
A metric that measures a model's ability to find all relevant cases within a dataset; the ratio of true positives to the total number of actual positives.
aiRecurrent Neural Network(RNN)
A class of neural networks where connections between nodes form a directed graph along a temporal sequence, allowing them to process data with a time dimension.
aiRed Teaming
A full-scope, multi-layered attack simulation designed to measure how well an organization's people, networks, applications, and physical security controls can withstand an attack from a real-life adversary.
securityRefactoring
The process of restructuring existing computer code without changing its external behavior.
devReferrer-Policy
An HTTP header that controls how much referrer information (the URL of the previous page) is sent with requests.
securityRegister Renaming
A technique used to eliminate false data dependencies between instructions by mapping architectural registers to a larger pool of physical registers.
hardwareRegression Analysis
A set of statistical processes for estimating the relationships between a dependent variable and one or more independent variables.
aiRegression Testing
Re-running functional and non-functional tests to ensure that previously developed and tested software still performs after a change.
devRegularization
A set of techniques used to prevent overfitting by adding a penalty term to the loss function or modifying the training process.
aiReinforcement Learning(RL)
A type of machine learning where an agent learns to make decisions by performing actions in an environment to maximize a cumulative reward.
aiReinforcement Learning from Human Feedback(RLHF)
A technique used to align AI models with human preferences by training them based on feedback from human evaluators.
aiRelational Database(RDBMS)
A type of database that stores and provides access to data points that are related to one another.
aiRelease Management
The process of managing, planning, scheduling, and controlling a software build through different stages and environments.
devRelease Pipeline
The latter part of a deployment pipeline focused on deploying artifacts to various environments and performing final verification.
devReliability Engineering
A sub-discipline of systems engineering that emphasizes the ability of equipment to function without failure.
devReLU
Rectified Linear Unit; a popular activation function that outputs the input directly if it is positive, and zero otherwise.
aiRemix
A full-stack web framework that focuses on web standards and modern user experience, built on top of React Router.
webReorder Buffer(ROB)
A hardware structure in out-of-order processors that ensures instructions are committed (retired) in their original program order.
hardwareRepeater
An electronic device that receives a signal and retransmits it at a higher level or higher power, so that the signal can cover longer distances.
networkReplay Attack
A cyberattack where a valid data transmission is maliciously repeated or delayed on a different chain or at a later time.
webReplicaSet
A Kubernetes object that ensures a specified number of pod replicas are running at any given time.
cloudReservation Station
A buffer that holds an instruction and its operands, waiting for execution until all dependencies are resolved.
hardwareReserved Capacity
A pricing model where users commit to using a specific amount of a cloud resource for a fixed term (1 or 3 years) in exchange for a significant discount.
cloudResilience Engineering
A paradigm for safety management that focuses on how to help people cope with complexity under pressure to achieve success.
devResource Prioritization
The process of telling the browser which resources are most important to load first to improve perceived performance.
webResource Tagging
The practice of assigning metadata to cloud resources in the form of key-value pairs to improve organization, cost tracking, and automation.
cloudResource Timing API
A browser API that provides detailed network timing data for every resource loaded by a web page.
webResponsible Disclosure
A vulnerability disclosure model where researchers report flaws to the vendor first and give them a reasonable amount of time to fix the issue before making it public.
securityResponsive Web Design(RWD)
An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.
webRetrieval-Augmented Generation(RAG)
A technique that enhances LLM outputs by retrieving relevant information from external knowledge bases before generating a response.
aiRetry Pattern
A design pattern that enables an application to handle transient failures when it tries to connect to a service or network resource.
devReturn Stack Buffer(RSB)
A specialized branch predictor used specifically to predict the return addresses of function calls.
hardwareReward Model
A separate model used in reinforcement learning to predict the reward an agent should receive for a given action or output.
aiRing Topology
A network topology where each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.
networkRIP(RIP)
A legacy distance-vector routing protocol that uses hop count as its primary metric.
networkRISC
Reduced Instruction Set Computer; a CPU design strategy based on simple instructions that can be executed quickly.
hardwareRISC-V
An open-standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC) principles.
hardwareRisk Assessment
The process of identifying, estimating, and prioritizing risks to an organization's operations and assets.
securityRisk Mitigation
The process of developing options and actions to enhance opportunities and reduce threats to project objectives.
securityRoBERTa
A Robustly Optimized BERT Pretraining Approach; an improved version of BERT that modifies the key hyperparameters and training data size.
aiROC Curve(ROC)
Receiver Operating Characteristic curve; a graph showing the performance of a classification model at all classification thresholds.
aiRole-Based Access Control(RBAC)
A method of regulating access to resources based on the roles of individual users.
securityRolling Update
A deployment strategy that gradually replaces old instances of an application with new ones, ensuring continuous availability.
cloudRollup
A type of Layer 2 scaling solution that performs transaction execution outside the main blockchain but posts transaction data to it.
webRook
An open-source cloud-native storage orchestrator for Kubernetes.
cloudRoot Cause Analysis(RCA)
A systematic process for identifying the underlying cause of a problem or incident to prevent it from recurring.
devRootkit
A collection of computer software, typically malicious, designed to conceal the existence of certain processes or programs from normal methods of detection.
securityRoot Mean Squared Error(RMSE)
A regression metric that calculates the square root of the average of squared differences between predicted and actual values.
aiRouter
A networking device that forwards data packets between computer networks, operating at the Network Layer (Layer 3).
networkRoute Table
A set of rules, called routes, that are used to determine where network traffic from a subnet or gateway is directed.
cloudRouting Protocol
A set of rules used by routers to determine the best path for data packets to travel across a network.
networkR-squared(R²)
A statistical measure that represents the proportion of the variance for a dependent variable that's explained by an independent variable or variables in a regression model.
aiRSTP(RSTP)
An evolution of STP that provides significantly faster convergence after a topology change.
networkRug Pull
A type of scam where developers abandon a project and run away with investors' funds.
webRuntime Application Self-Protection (RASP)(RASP)
A security technology that resides within an application's runtime environment and can detect and block attacks in real-time.
security