proactive

(redirected from proactively)
Also found in: Thesaurus, Encyclopedia.
Related to proactively: reactively

pro·ac·tive

 (prō-ăk′tĭv)
adj.
Acting in advance to deal with an expected difficulty; anticipatory: proactive steps to prevent terrorism.

pro·ac′tion n.
pro·ac′tive·ly adv.
pro·ac′tive·ness, pro′ac·tiv′i·ty n.

proactive

(prəʊˈæktɪv)
adj
1. tending to initiate change rather than reacting to events
2. (Psychology) psychol of or denoting a mental process that affects a subsequent process
[C20: from pro-2 + (re)active]

pro•ac•tive

(proʊˈæk tɪv)

adj.
serving to prepare for, intervene in, or control an expected occurrence or situation: proactive measures against crime.
[1930–35]
pro•ac′tive•ly, adv.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Adj.1.proactive - descriptive of any event or stimulus or process that has an effect on events or stimuli or processes that occur subsequently; "proactive inhibition"; "proactive interference"
psychological science, psychology - the science of mental life
retroactive - descriptive of any event or stimulus or process that has an effect on the effects of events or stimuli or process that occurred previously
2.proactive - (of a policy or person or action) controlling a situation by causing something to happen rather than waiting to respond to it after it happens
active - disposed to take action or effectuate change; "a director who takes an active interest in corporate operations"; "an active antagonism"; "he was active in drawing attention to their grievances"
Translations
proaktivní
proactivo
주도적

proactive

[prəʊˈæktɪv] ADJproactivo

proactive

[prəʊˈæktɪv] adjproactif/ive
to adopt a proactive approach → adopter une approche proactive

proactive

adjproaktiv
References in periodicals archive ?
The application "answers the urgent call to maximize royalty revenue by proactively managing valuable and complex intellectual property (IP) assets and their associated contractual agreements, as IP becomes an increasingly important revenue channel for companies," Nextance said in an announcement.
Quest Software Foglight: This solution provides a single point of access to quickly and proactively detect, diagnose and resolve performance issues.
Using award-winning Correlation, Causation and Correction technology, Zenprise proactively troubleshoots and prescribes fixes to BlackBerry[R] Enterprise Server (BES) email and application issues, thereby enabling companies to manage the growth of BlackBerry users and service levels with confidence.
to help mid-sized manufacturers proactively manage by integrating and coordinating scheduling with real-time tracking and updating of all resources, materials, labor and capacity.
This platform joins a technically sophisticated fleet of four other craft that are proactively collecting country-wide data throughout the United States and Europe as part of Intermap's accelerated NEXTMap([R]) initiative.
Global topology data enables the Sockeye Networks GlobalRoute service to proactively determine alternate best-cost, best-performance routes for Internet protocol (IP) traffic.
As a result, the measurement and instrumentation framework necessary to proactively address security, reliability and manageability were not built into the core design.
Leading the surge in the financial industry are credit unions concerned with proactively protecting online customers from identity theft caused by phishing attacks.
Cypress to Proactively Measure Soft Error Impacts of Atmospheric Neutron and Alpha Particles to Assure Reliability
Using EYE, PCC's ICT can now proactively monitor and optimize its network infrastructure assets, including 65 primary and 15 secondary schools and nine libraries, for the educational and business applications delivering services such as high-speed Internet access, video conferencing, secure data transfer, and VoIP.
In addition, Cyveillance can provide credit/debit card monitoring services for credit unions to proactively identify stolen card and personal information being openly sold or traded on the Internet, minimizing losses due to credit card fraud.
Customizable Attack Combination of Protocols, Authentication and IPv4 or IPv6 Transport Help Mu 4000 End Users and Developers Proactively Beat Hackers