Browse Definitions :

Browse Definitions by Alphabet

NAT - NER

  • National Health Information Infrastructure - The National Health Information Infrastructure (NHII) was a government initiative first proposed under former President George W.
  • National Health Information Infrastructure (NHII) - The National Health Information Infrastructure (NHII) was a government initiative first proposed under former President George W.
  • National Health Service - The National Health Service (NHS) is the publicly funded national healthcare system in the United Kingdom.
  • National Health Service (NHS) - The National Health Service (NHS) is the publicly funded national healthcare system in the United Kingdom.
  • National Highway Traffic Safety Administration (NHTSA) - The National Highway Traffic Safety Administration (NHTSA) is a federal agency of the United States government tasked with upholding regulatory safety standards in automobile manufacturing and the highway transportation system.
  • national ID card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
  • National Informatics Centre (NIC) - The National Informatics Centre (NIC) is an institute set up by the Indian government in 1976 to drive its technology and e-governance initiatives.
  • National Institute of Standards and Technology - NIST is the National Institute of Standards and Technology, a unit of the U.
  • National Institutes of Health - The National Institutes of Health (NIH) is the principal federal agency for health research in the United States.
  • National Institutes of Health (NIH) - The National Institutes of Health (NIH) is the principal federal agency for health research in the United States.
  • National Library of Medicine - The U.S.
  • National Nanotechnology Initiative - The National Nanotechnology Initiative (NNI) is a research-and development (R & D) program funded by the U.
  • National Nanotechnology Initiative (NNI) - The National Nanotechnology Initiative (NNI) is a research-and development (R & D) program funded by the U.
  • National Population Register (NPR) of India - The National Population Register (NPR) is a database of the identities of all Indian residents.
  • national provider identifier - A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare providers in the United States.
  • national provider identifier (NPI) - A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare providers in the United States.
  • National Quality Forum - The National Quality Forum (NQF) is a nonprofit organization based in Washington, D.
  • National Quality Forum (NQF) - The National Quality Forum (NQF) is a nonprofit organization based in Washington, D.
  • National Security Agency - The National Security Agency is the official U.
  • National Security Agency (NSA) - The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).
  • National Stock Exchange (NSE) of India - The National Stock Exchange (NSE), is a leading stock exchange in India.
  • National Technical Research Organisation (NTRO) - The National Technical Research Organisation (NTRO) is an Indian technical intelligence agency.
  • National Television Standards Committee - The NTSC (National Television Standards Committee) was responsible for developing, in 1953, a set of standard protocol for television (TV) broadcast transmission and reception in the United States.
  • National Television Standards Committee (NTSC) - The NTSC (National Television Standards Committee) was responsible for developing, in 1953, a set of standard protocol for television (TV) broadcast transmission and reception in the United States.
  • National Voluntary Laboratory Accreditation Program - The National Voluntary Laboratory Accreditation Program (NVLAP) is a federal program run by the National Institute of Standards and Technology that provides third-party accreditation to laboratories in the U.
  • National Voluntary Laboratory Accreditation Program (NVLAP) - The National Voluntary Laboratory Accreditation Program (NVLAP) is a federal program run by the National Institute of Standards and Technology that provides third-party accreditation to laboratories in the U.
  • National Vulnerability Database (NVD) - NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.
  • Nationwide Health Information Network - The Nationwide Health Information Network (NHIN) is a set of standards, services and policies that enable secure health information exchange (HIE) over the Internet.
  • Nationwide Health Information Network (NHIN) - The Nationwide Health Information Network (NHIN) is a set of standards, services and policies that enable secure health information exchange (HIE) over the Internet.
  • native - In computer systems, native means "original" or "basic.
  • native advertising - Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • native application - A native application is a software program that is developed for use on a particular platform or device.
  • native cloud application - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • native cloud application (NCA) - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • native code - Native code is computer programming (code) that is compiled to run with a particular processor and its set of instructions.
  • NATO off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • natural disaster recovery - Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.
  • natural language - In computing, natural language refers to a human language such as English, Russian, German, or Japanese as distinct from the typically artificial command or programming language with which one usually talks to a computer.
  • natural language generation (NLG) - Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narrative from a dataset.
  • natural language processing - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • natural language processing (NLP) - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • natural language query - A natural language query is input that consists solely of terms or phrases spoken normally or entered as they might be spoken, without any non-language characters, such as the plus symbol or the asterisk, and without any special format or alteration of syntax.
  • natural language understanding (NLU) - Natural language understanding (NLU) is a branch of artificial intelligence (AI) that uses computer software to understand input in the form of sentences using text or speech.
  • natural number - A natural number is a number that occurs commonly and obviously in nature.
  • natural user interface - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • natural user interface (NUI) - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • NBA - Network behavior analysis (NBA) is a method of enhancing the security of a proprietary network by monitoring traffic and noting unusual actions or departures from normal operation.
  • NBAD - Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or extraordinary trends.
  • NBAR - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • NBAR (Network Based Application Recognition) - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • NBMA - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • NBMA (non-broadcast multiple access) - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • NC - A network computer (NC) is a concept from Oracle and Sun Microsystems that describes a low-cost personal computer for business networks that, like the NetPC, would be configured with only essential equipment (including CD-ROM players, diskette drives or expansion slots) and managed centrally.
  • NCA - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • NCFA - In the U.K.
  • NCM - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • NCR (no country redirect) - An explanation of the NCR (no country redirect) search parameter.
  • NCSA - NCSA at the University of Illinois in Urbana, Illinois is the home of the first Web browser that had a graphical user interface.
  • NCSC - The National Computer Security Center (NCSC) is a U.
  • NCVHS - The National Committee on Vital and Health Statistics (NCVHS) is an advisory body to the U.
  • NDA - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • NDIS - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • NDIS (Network Driver Interface Specification) - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • NDMP - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • NDMP (Network Data Management Protocol) - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • NDS - Novell Directory Services (NDS) is a popular software product for managing access to computer resources and keeping track of the users of a network, such as a company's intranet, from a single point of administration.
  • near CDP - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near continuous data protection - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near end crosstalk - Also see NeXT, a computer company that developed a personal computer with an advanced user interface and operating system.
  • Near Field Communication - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • Near Field Communication (NFC) - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • near-continuous data protection - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near-continuous data protection (near CDP) - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near-end crosstalk - Also see NeXT, a computer company that developed a personal computer with an advanced user interface and operating system.
  • near-end crosstalk (NEXT) - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • near-infrared illumination - Near-infrared illumination is a method of night vision wherein a device that is sensitive to invisible near infrared radiation is used in conjunction with an infrared illuminator.
  • nearables - Nearables are low-power transmitters that activate in the presence of a Bluetooth-enabled or Near Field Communication (NFC-enabled) computing device.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than in your own country.
  • Nebula - Nebula is an open source cloud computing program that provides on-demand computing power for NASA researchers and scientists.
  • NECP - The National Emergency Communications Plan (NECP) is a strategic plan for improving emergency response communications and efforts in the United States.
  • NED - A nano-emissive display (NED) is a high-resolution, full-color, lightweight, physically thin display that uses carbon nanotube technology.
  • NEDSS - The National Electronic Disease Surveillance System (NEDSS) is a secure online framework that allows healthcare professionals and government agencies to communicate about disease patterns and coordinate national response to outbreaks.
  • needs assessment - A needs assessment is an exercise that identifies the difference between a current condition/state and the desired condition/state.
  • negative acknowledgement - NAK is an abbreviation for negative acknowledgment or not acknowledged.
  • negative correlation - A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.
  • negative float (negative slack) - Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.
  • negativity bias - Negativity bias is the tendency of humans to place more significance on negative events than neutral or positive ones.
  • negawatt - A negawatt is a negative megawatt: a megawatt of power saved by increasing efficiency or reducing consumption.
  • NeGP - National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.
  • neighborhood electric vehicle (NEV) - A neighborhood electric vehicle (NEV) is a type of battery-electric vehicle that is capable of traveling at a maximum speed of 25 mph and which has a maximum loaded weight of 3,000 lbs.
  • nematic liquid crystal - A nematic liquid crystal is a transparent or translucent liquid that causes the polarization (that is, the focusing in a plane) of light waves to change as the waves pass through the liquid.
  • neo-luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • Neo4j - Neo4j is a NoSQL graph database management system.
  • neologism - A neologism (pronounced nee-AH-low-djism) is a newly invented word or term.
  • NERC - North American Electric Reliability Corporation (NERC) is an institution that oversees and regulates the reliability of the North American electrical grids.
  • NERC CIP (critical infrastructure protection) - The NERC CIP (critical infrastructure protection) plan is a set of requirements designed to secure assets vital to reliably operating North America's bulk electric system.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close