Find keyword or terms by letter
Click on a numbered or lettered box below to show list of keywords and terms.
RAC (Real Application Cluster)
(Context: )
Definition
A component of the Oracle database product that allows a database to be installed across multiple servers. According to Oracle, RAC's shared disk method of clustering databases: increases scalability because servers can easily be added or subtracted to meet current needs, lowers costs because companies don't have to buy high-end servers, and improves availability because if one server fails, another can assume its workload. RAC's shared disk architecture is an unusual approach to database clustering. Most competing database products (such as Microsoft's SQL Server and IBM's DB2 for Windows and Unix environments) use the alternative, which is known as "shared nothing" architecture. Shared nothing architecture partitions data and only gives each server access to its own disk subsystem, while shared disk architecture gives all servers access to the entire database. This adds failover capacity to the database, because all servers have access to the whole database. Proponents claim that this capacity increases Oracle's reliability and availability significantly. British Telecom, for example, reported that deploying the product enabled them to cut their failover time from a typical 20 minutes to between 10-60 seconds.
RAM Mobile Data
(Context: )
Definition
A wireless service. A company jointly owned by RAM Broadcasting, Inc., Ericsson, and BellSouth Corp. that provides a cellular-radio-based packet data service called Mobitex. Competes with Ardis and CDPD. Ericsson encourages others to manufacture compatible equipment (people prefer an open standard). (Taken from O’Reilly.)
Ransomware
(Context: Information Systems Security, Software)
Definition
1. A type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim's files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash or Bitcoin and other cryptocurrency are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
2. Malicious software designed to gain access to files and encrypt data by generating a private-public pair of keys. The data is impossible to decrypt without the private key which is retained by the attacker’s server until the ransom is paid.
1.
2. EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
Rapid elasticity
(Context: )
Definition
Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.
Recommended Practices
(Context: )
Definition
Are activities which are normally considered leading edge or exceptional models for others to follow. They have been proven to be successful and sustainable and can be readily adopted by agencies. They may or may not be considered the ultimate "best practice" by all readers but for this place and time they are recommended practices and should be used and implemented wherever possible.
Recovery
(Context: General)
Definition
Activities beyond the initial crisis period of an emergency or disaster that are designed to return information systems and/or data to normal operating status.
Recovery Point Objective (RPO)
(Context: General, Technology Management)
Definition
1. The measurement of the point in time to which data must be restored in order to resume processing transactions. Directly related to the amount of data that can be lost between the point of recovery and the time of the last data backup.
2. The maximum tolerable period in which data might be lost from an IT system or service due to a major incident.
1.
2. EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
Recovery Time Objective (RTO)
(Context: General, Technology Management)
Definition
1. The period of time in which systems, applications or functions must be recovered after an outage.
2. The duration of time within which a business process must be restored and a stated service level achieved following a disruption in order to avoid unacceptable consequences associated with a break in service.
1.
2. EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
Redundant Array of Independent Disk (RAID)
(Context: General)
Definition
A method of organizing small format disk devices to drastically increase I/O bandwidth and improve data availability.
Relationship
(Context: General)
Definition
Context: (Commonwealth Data Management Program). An association between entities that is relevant to the constraints, rules and policies of an agency. Relationships can be thought of as verbs, linking two or more nouns. Examples: A owns relationship between a company and a computer(s), A supervises relationship between a manager and a subordinate(s), A performs relationship between an employee and a task(s), A proved relationship between a mathematician and a theorem (s), an employed relationship between an employee and a job position(s).
Remaining Duration (RD)
(Context: General)
Definition
The time in calendar units, between the data date of the project schedule and the finish date of a schedule activity that has an actual start date. This represents the time needed to complete a schedule activity where the work is in progress. (PMBOK 3RD EDITION)
PMBOK
Remote Access
(Context: General)
Definition
Remote access is the ability to get access to a computer or a network from a remote distance.
Remote Control
(Context: General)
Definition
Remote Control is a technology or protocol that displays the screen of another computer (via Internet or network) on the remote user's own screen. The program allows the remote user to use a mouse and keyboard to control the other computer remotely.
Remote Method Invocation (RMI)
(Context: General)
Definition
A J2EE RPC
Remote Online Notarization (RON)
(Context: General)
Definition
The process of having a state-licensed notary public notarize a document remotely using electronic signature, identity verification, audio-visual and electronic notarial journal and record keeping technologies
EA-Solution-Computer-based-Signature-Standard.pdf (virginia.gov)
Remote Procedure Call (RPC)
(Context: General)
Definition
An external form of communication that allows a client to invoke a procedure in a server.
Repository
(Context: General)
Definition
A repository is a collection of resources that can be accessed to retrieve information. Repositories often consist of several databases tied together by a common search engine.
Repudiation
(Context: General)
Definition
Denial that one did or said something.
Request for Information (RFI)
(Context: General)
Definition
An informal document issued when an agency is not aware of the products available in the market which may satisfy its requirements. The use of an RFI does not require a purchase requisition, however a RFI may result in the development of a requisition, or the issuance of an IFB or RFP after an agency determines the types of products that are available which will satisfy its requirements. An RFI cannot be made into an agreement. (DGS - APSPM)
Request for Proposals
(Context: General)
Definition
All documents, whether attached or incorporated by reference, utilized for soliciting proposals; the RFP procedure requires negotiation with offerors (to include prices) as distinguished from competitive bidding when using an Invitation for Bids. (DGS - APSPM)
Required Log
(Context: Information Systems Security)
Definition
An event log containing data considered essential to the analysis and resolution of a cybersecurity incident, sourced from one of the following log types:
- Perimeter device logs
- Operating system event logs
- Endpoint logs
- Application logs
- Proxy logs
- IoT logs
https://www.vita.virginia.gov/media/vitavirginiagov/it-governance/ea/pdf/Event-Log-Management.pdf
Requirement(s)
(Context: General)
Definition
A statement or set of statements that define what the user(s) of a product want that product to do. Generally, it defines what capabilities a product needs to have, based on the needs of the users.
Requirements
(Context: Enterprise Architecture)
Definition
Numbered statements that provide mandatory Enterprise Architecture direction (example: NET-R-01) and strategic components of the Commonwealth’s Enterprise Technical Architecture Technical Component Standards tables which are acceptable activities for current deployments and must be implemented and used for all future deployments.
Requirements Document
(Context: General)
Definition
A formal document that consists of a statement or set of statements that define product functions and capabilities as set by the end user.
Reserve
(Context: General)
Definition
A provision in the project management plan to mitigate cost and/or schedule risk. Often used with a modifier (e.g., management reserve, contingency reserve) to provide further detail on what types of risk are meant to be mitigated. The specific meaning of the modified term varies by application area.
Residual Risk
(Context: General)
Definition
The portion of risk that remains after security measures have been applied.
Resource
(Context: General)
Definition
Skilled human resources (specific disciplines either individually or in crews or teams), equipment, services, supplies, commodities, material, budgets, or funds.
PMBOK
Resource Leveling
(Context: General)
Definition
Any form of schedule network analysis in which scheduling decisions (start and finish dates) are driven by resource constraints (e.g., limited resource availability or difficult-to-manage changes in resource availability levels.)
PMBOK
Resource Loading Profiles
(Context: General)
Definition
Detailed staffing plan including number of personnel by type over time.
Resource Planning
(Context: General)
Definition
Determining what resources (people, equipment, materials) are needed in what quantities to perform project activities.
Resource pooling
(Context: General)
Definition
The provider’s computing resources are pooled to serve multiple consumers using a multi- tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.
Resource-Limited Schedule
(Context: General)
Definition
A project schedule whose schedule activity, scheduled start dates and scheduled finish dates reflect expected resource availability.
PMBOK
Responsibility Assignment Matrix (RAM)
(Context: General)
Definition
A structure that relates the project organizational breakdown structure to the work breakdown structure to help ensure that each component of the project’s scope of work is assigned to a responsible person.
PMBOK
Restoration
(Context: General)
Definition
Activities designed to return damaged facilities and equipment to operational status.
Retainage
(Context: General)
Definition
A portion of a contract payment that is withheld until contract completion to ensure full performance of the contract terms.
PMBOK
Retention Period
(Context: Technology Management)
Definition
The amount of time to keep the backup, in days, weeks, months, or years.
EA-Solution-Data-Availability-Requirements.pdf (virginia.gov)
Return on Investment
(Context: General)
Definition
A figure of merit used to help make capital investment decisions. ROI is calculated by considering the annual benefit divided by the investment amount. (GAO)
Reusable Component
(Context: General)
Definition
A sub-object derived from an object or a class of objects by taking advantage of inheritance properties. The derived object inherits the instance variables and methods of the super class but may add new instance variables and methods.
Risk
(Context: General)
Definition
Context: (Security). The potential that an event may cause a material negative impact to an asset.
Context: (Technology Management). An uncertain event or condition that, if it occurs, has a positive or negative effect on a project’s objectives.
PMBOK
Risk Acceptance
(Context: General)
Definition
A risk response planning technique that indicates that the project team has decided not to change the project management plan to deal with a risk, or is unable to identify any other suitable response strategy.
PMBOK
Risk Analysis
(Context: General)
Definition
Context: (Security). A systematic process to identify and quantify risks to information systems and data and to determine the probability of the occurrence of those risks.
Context: (Technology Management). A technique to identify and assess factors that may jeopardize the success of a project or achieving a goal. The technique also helps define preventive measures to reduce the probability of these factors from occurring and identify countermeasures to successfully deal with these constraints when they develop. (GAO)
Risk Assessment (RA)
(Context: General)
Definition
Context: (Security). The process of identifying and evaluating risks to assess their potential impact. Context: Technology Management). Review, examination, and judgment of whether or not the identified risks are acceptable.
Risk Avoidance
(Context: General)
Definition
A risk response planning technique for a threat that creates changes to the project management plan that are meant to either eliminate the risk or to protect the project objectives from its impact.
PMBOK
Risk Control
(Context: General)
Definition
Involves executing the Risk Management Plan in order to respond to risk events over the course of the project.
Risk Event
(Context: General)
Definition
A discrete occurrence that may adversely or favorably affect the project.
Risk Identification
(Context: General)
Definition
The process of determining which risks might affect the project and documenting their characteristics.
PMBOK
Risk Management
(Context: Security)
Definition
Identification and implementation of information security controls in order to reduce risks to an acceptable level.
(Context: Technology Management)
The process of identifying, analyzing, and responding to risk factors throughout the life of a project and in the best interests of its objectives. The art and science of identifying, analyzing, and responding to risk factors throughout the life of a project and in the best interests of its objectives.
Risk Management Plan
(Context: )
Definition
The document describing how project risk management will be structured and performed on the project.
PMBOK
Risk Mitigation
(Context: General)
Definition
Context: (Security). The continuous process of minimizing risk by applying security measures commensurate with sensitivity and risk.
Context: (Technology Management). A risk response planning technique associated with threats that seek to reduce the probability of occurrence or impact of a risk to below an acceptable threshold. (PMBOK 3RD EDITION)
PMBOK
Risk Mitigation Plan
(Context: General)
Definition
The document describing how project risk management will be structured and performed on the project. (PMBOK 3RD EDITION)
Risk Statement (also known as Statement of Risk)
(Context: General)
Definition
A description of the current conditions that may lead to a loss or a description of the loss or consequence. (SEI)
Roles and Responsibility
(Context: General)
Definition
Roles represent a distinct set of operations and responsibilities required to perform some particular function that an individual may be assigned. Roles may differ from the individual's business title.
Router
(Context: General)
Definition
1) An attaching device that connects two LAN segments, which use similar or different architectures, at the reference model network layer.
2) (IRM) The combination of hardware and software that links LANs and WANs together.
Run the Business
(Context: General)
Definition
A project portfolio category for projects that support business functionality, deliverables, or processes by correcting or modifying existing assets. These projects do not introduce new functionality.