R

Radar Chart

A graphical method of displaying multivariate data in the form of a two-dimensional chart of three or more quantitative variables represented on axes starting from the same point.

ai

Rainbow Table Attack

A type of attack used to crack password hashes by using pre-computed tables of hashes for every possible password.

security

Random Access Memory(RAM)

A type of computer memory that can be read and changed in any order, typically used to store working data and machine code.

hardware

Random Forest

An ensemble learning method that operates by constructing a multitude of decision trees during training and outputting the average prediction of the individual trees.

ai

Random Sampling

A sampling technique where each member of the population has an equal chance of being selected.

ai

Random Search

A hyperparameter optimization technique that selects random combinations of hyperparameters to train and evaluate models.

ai

Ransomware

A type of malware that threatens to publish or block access to data unless a ransom is paid.

security

React

A popular JavaScript library for building user interfaces, particularly single-page applications, using a component-based architecture.

web

Reactive Programming

A declarative programming paradigm concerned with data streams and the propagation of change.

dev

ReAct Prompting(ReAct)

A prompting technique that combines 'Reasoning' and 'Acting,' allowing an LLM to generate reasoning traces and task-specific actions in an interleaved manner.

ai

Read-Only Memory(ROM)

A type of non-volatile memory used in computers and other electronic devices that cannot be easily modified.

hardware

Read Replica

A copy of a primary database instance that can be used to serve read-only traffic, improving performance and scalability.

cloud

Reassembly

The process of putting fragmented IP packets back together into their original form at the destination device.

network

Recall

A metric that measures a model's ability to find all relevant cases within a dataset; the ratio of true positives to the total number of actual positives.

ai

Recurrent Neural Network(RNN)

A class of neural networks where connections between nodes form a directed graph along a temporal sequence, allowing them to process data with a time dimension.

ai

Red Teaming

A full-scope, multi-layered attack simulation designed to measure how well an organization's people, networks, applications, and physical security controls can withstand an attack from a real-life adversary.

security

Refactoring

The process of restructuring existing computer code without changing its external behavior.

dev

Referrer-Policy

An HTTP header that controls how much referrer information (the URL of the previous page) is sent with requests.

security

Register Renaming

A technique used to eliminate false data dependencies between instructions by mapping architectural registers to a larger pool of physical registers.

hardware

Regression Analysis

A set of statistical processes for estimating the relationships between a dependent variable and one or more independent variables.

ai

Regression Testing

Re-running functional and non-functional tests to ensure that previously developed and tested software still performs after a change.

dev

Regularization

A set of techniques used to prevent overfitting by adding a penalty term to the loss function or modifying the training process.

ai

Reinforcement Learning(RL)

A type of machine learning where an agent learns to make decisions by performing actions in an environment to maximize a cumulative reward.

ai

Reinforcement Learning from Human Feedback(RLHF)

A technique used to align AI models with human preferences by training them based on feedback from human evaluators.

ai

Relational Database(RDBMS)

A type of database that stores and provides access to data points that are related to one another.

ai

Release Management

The process of managing, planning, scheduling, and controlling a software build through different stages and environments.

dev

Release Pipeline

The latter part of a deployment pipeline focused on deploying artifacts to various environments and performing final verification.

dev

Reliability Engineering

A sub-discipline of systems engineering that emphasizes the ability of equipment to function without failure.

dev

ReLU

Rectified Linear Unit; a popular activation function that outputs the input directly if it is positive, and zero otherwise.

ai

Remix

A full-stack web framework that focuses on web standards and modern user experience, built on top of React Router.

web

Reorder Buffer(ROB)

A hardware structure in out-of-order processors that ensures instructions are committed (retired) in their original program order.

hardware

Repeater

An electronic device that receives a signal and retransmits it at a higher level or higher power, so that the signal can cover longer distances.

network

Replay Attack

A cyberattack where a valid data transmission is maliciously repeated or delayed on a different chain or at a later time.

web

ReplicaSet

A Kubernetes object that ensures a specified number of pod replicas are running at any given time.

cloud

Reservation Station

A buffer that holds an instruction and its operands, waiting for execution until all dependencies are resolved.

hardware

Reserved Capacity

A pricing model where users commit to using a specific amount of a cloud resource for a fixed term (1 or 3 years) in exchange for a significant discount.

cloud

Resilience Engineering

A paradigm for safety management that focuses on how to help people cope with complexity under pressure to achieve success.

dev

Resource Prioritization

The process of telling the browser which resources are most important to load first to improve perceived performance.

web

Resource Tagging

The practice of assigning metadata to cloud resources in the form of key-value pairs to improve organization, cost tracking, and automation.

cloud

Resource Timing API

A browser API that provides detailed network timing data for every resource loaded by a web page.

web

Responsible Disclosure

A vulnerability disclosure model where researchers report flaws to the vendor first and give them a reasonable amount of time to fix the issue before making it public.

security

Responsive Web Design(RWD)

An approach to web design that makes web pages render well on a variety of devices and window or screen sizes.

web

Retrieval-Augmented Generation(RAG)

A technique that enhances LLM outputs by retrieving relevant information from external knowledge bases before generating a response.

ai

Retry Pattern

A design pattern that enables an application to handle transient failures when it tries to connect to a service or network resource.

dev

Return Stack Buffer(RSB)

A specialized branch predictor used specifically to predict the return addresses of function calls.

hardware

Reward Model

A separate model used in reinforcement learning to predict the reward an agent should receive for a given action or output.

ai

Ring Topology

A network topology where each node connects to exactly two other nodes, forming a single continuous pathway for signals through each node.

network

RIP(RIP)

A legacy distance-vector routing protocol that uses hop count as its primary metric.

network

RISC

Reduced Instruction Set Computer; a CPU design strategy based on simple instructions that can be executed quickly.

hardware

RISC-V

An open-standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC) principles.

hardware

Risk Assessment

The process of identifying, estimating, and prioritizing risks to an organization's operations and assets.

security

Risk Mitigation

The process of developing options and actions to enhance opportunities and reduce threats to project objectives.

security

RoBERTa

A Robustly Optimized BERT Pretraining Approach; an improved version of BERT that modifies the key hyperparameters and training data size.

ai

ROC Curve(ROC)

Receiver Operating Characteristic curve; a graph showing the performance of a classification model at all classification thresholds.

ai

Role-Based Access Control(RBAC)

A method of regulating access to resources based on the roles of individual users.

security

Rolling Update

A deployment strategy that gradually replaces old instances of an application with new ones, ensuring continuous availability.

cloud

Rollup

A type of Layer 2 scaling solution that performs transaction execution outside the main blockchain but posts transaction data to it.

web

Rook

An open-source cloud-native storage orchestrator for Kubernetes.

cloud

Root Cause Analysis(RCA)

A systematic process for identifying the underlying cause of a problem or incident to prevent it from recurring.

dev

Rootkit

A collection of computer software, typically malicious, designed to conceal the existence of certain processes or programs from normal methods of detection.

security

Root Mean Squared Error(RMSE)

A regression metric that calculates the square root of the average of squared differences between predicted and actual values.

ai

Router

A networking device that forwards data packets between computer networks, operating at the Network Layer (Layer 3).

network

Route Table

A set of rules, called routes, that are used to determine where network traffic from a subnet or gateway is directed.

cloud

Routing Protocol

A set of rules used by routers to determine the best path for data packets to travel across a network.

network

R-squared()

A statistical measure that represents the proportion of the variance for a dependent variable that's explained by an independent variable or variables in a regression model.

ai

RSTP(RSTP)

An evolution of STP that provides significantly faster convergence after a topology change.

network

Rug Pull

A type of scam where developers abandon a project and run away with investors' funds.

web

Runtime Application Self-Protection (RASP)(RASP)

A security technology that resides within an application's runtime environment and can detect and block attacks in real-time.

security