Browse Definitions :

Browse Definitions by Alphabet

NAT - NET

  • native advertising - Native advertising is the integration of marketing content with a website in such a way that it is not distinct from the rest of the site in terms of its content, format, style or placement.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • native application - A native application is a software program that is developed for use on a particular platform or device.
  • native cloud application - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • NATO off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • natural disaster recovery - Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.
  • natural language - In computing, natural language refers to a human language such as English, Russian, German, or Japanese as distinct from the typically artificial command or programming language with which one usually talks to a computer.
  • natural language generation (NLG) - Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set.
  • natural language processing - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • natural language processing (NLP) - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • natural language query - A natural language query is input that consists solely of terms or phrases spoken normally or entered as they might be spoken, without any non-language characters, such as the plus symbol or the asterisk, and without any special format or alteration of syntax.
  • natural language understanding (NLU) - Natural language understanding (NLU) is a branch of artificial intelligence (AI) that uses computer software to understand input in the form of sentences using text or speech.
  • natural number - A natural number is a number that occurs commonly and obviously in nature.
  • natural user interface - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • natural user interface (NUI) - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • NBAD - Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or extraordinary trends.
  • NBAR - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • NBAR (Network Based Application Recognition) - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • NBMA - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • NCA - A native cloud application (NCA) is a program that is designed specifically for a cloud computing architecture.
  • NCM - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • NCR (no country redirect) - An explanation of the NCR (no country redirect) search parameter.
  • NCVHS - The National Committee on Vital and Health Statistics (NCVHS) is an advisory body to the U.
  • NDA - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • NDIS - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • NDIS (Network Driver Interface Specification) - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • NDMP - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • NDMP (Network Data Management Protocol) - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • near CDP - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near continuous data protection - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near end crosstalk - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • Near Field Communication - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • Near Field Communication (NFC) - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • near-continuous data protection - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near-continuous data protection (near CDP) - Near-continuous data protection, sometimes called near-continuous protection, is a general term for backup and recovery products that take snapshots at set intervals.
  • near-end crosstalk - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • near-end crosstalk (NEXT) - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • nearables - Nearables are low-power transmitters that activate in the presence of a Bluetooth-enabled or Near Field Communication (NFC-enabled) computing device.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
  • Nebula - Nebula is an open source cloud computing program that provides on-demand computing power for NASA researchers and scientists.
  • NECP - The National Emergency Communications Plan (NECP) is a strategic plan for improving emergency response communications and efforts in the United States.
  • needs assessment - A needs assessment is an exercise that identifies the difference between a current condition/state and the desired condition/state.
  • negative acknowledgement - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • negative correlation - A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.
  • negative float (negative slack) - Negative float or slack is time that must be made up on a task on a project's critical path so that it does not delay the completion of a project.
  • negativity bias - Negativity bias is the tendency of humans to place more significance on negative events than neutral or positive ones.
  • NeGP - National eGovernance Plan (NeGP) is an initiative by the government of India to combine various e-governance systems around the country to create a national network that provides government services to all citizens electronically.
  • neighborhood electric vehicle (NEV) - A neighborhood electric vehicle (NEV) is a type of battery-electric vehicle that is capable of traveling at a maximum speed of 25 mph and which has a maximum loaded weight of 3,000 lbs.
  • nematic liquid crystal - A nematic liquid crystal is a transparent or translucent liquid that causes the polarization (that is, the focusing in a plane) of light waves to change as the waves pass through the liquid.
  • neo-luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • Neo4j - Neo4j is a NoSQL graph database management system.
  • neologism - A neologism (pronounced nee-AH-low-djism) is a newly invented word or term.
  • NERC - North American Electric Reliability Corporation (NERC) is an institution that oversees and regulates the reliability of the North American electrical grids.
  • NERC CIP (critical infrastructure protection) - The NERC CIP (critical infrastructure protection) plan is a set of requirements designed to secure assets vital to reliably operating North America's bulk electric system.
  • Nessus - Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.
  • Nest Labs - Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
  • nested - In general, something that is nested is fully contained within something else of the same kind.
  • nested virtualization - Nested virtualization describes the process of running a hypervisor within another hypervisor.
  • nested VM (nested virtual machine) - A nested VM (nested virtual machine) is a virtual machine contained within another VM.
  • net bias - Net bias is discrimination of price, content quality, connection reliability and speed that Internet service providers (ISP) can enact on users based on arbitrary conditions.
  • net income - Net income is the amount of money left after all the expenses of a business have been subtracted from the gross revenue for a given reporting period, such as a fiscal quarter.
  • Net indexer 2 - Ni2 (Net indexer 2) is the indexer for the AltaVista public search engine.
  • net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • net price - Net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted.
  • Net Promoter Score (NPS) - Net Promoter Score (NPS) is a metric for assessing customer loyalty for a company's brand, products or services.
  • Net-SNMP (Net Simple Network Management Protocol) - Net-SNMP is a set of tools and libraries for implementing the Simple Network Management Protocol (SNMP) on enterprise networks.
  • net-zero energy building - A net-zero energy (NZE) building is one that produces as much energy, from renewable sources, as it uses.
  • NetApp - NetApp, formerly Network Appliance Inc.
  • NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
  • NetApp Insight - NetApp Insight is an annual technical conference series for NetApp, a computer storage and data management company.
  • NetApp SolidFire - NetApp SolidFire is a business division of NetApp Inc.
  • NetBeans - NetBeans is a Java-based integrated development environment (IDE).
  • NetBEUI - NetBEUI (NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.
  • NetBEUI (NetBIOS Extended User Interface) - NetBEUI (NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.
  • NetBIOS - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • NetBIOS Extended User Interface - NetBEUI (NetBIOS Extended User Interface) is a new, extended version of NetBIOS, the program that lets computers communicate within a local area network.
  • netbook - A netbook is a small, light, low-power notebook computer that has less processing power than a full-sized laptop but is still suitable for word processing, running a Web browser and connecting wirelessly to the Internet.
  • NETCONF - NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.
  • Netflix Spinnaker - Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.
  • NetFlow - NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.
  • netiquette - Netiquette is etiquette on the Internet.
  • netizen - The word netizen seems to have two similar meanings.
  • NetOps - NetOps, also referred to as NetOps 2.
  • NetScaler (SDX) - Citrix NetScaler SDX is a service delivery networking platform for enterprise and cloud datacenters.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • NetSuite - NetSuite is a business technology vendor based in San Mateo, California.
  • nettop - A nettop is a small, low-power and relatively inexpensive desktop computer.
  • network access control - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
  • network access control (NAC) - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
  • network access point - In the United States, a network access point (NAP) is one of several major Internet interconnection points that serve to tie all the Internet access providers together so that, for example, an AT&T user in Portland, Oregon can reach the Web site of a Bell South customer in Miami, Florida.
  • network access point (NAP) - In the United States, a network access point (NAP) is one of several major Internet interconnection points that serve to tie all the Internet access providers together so that, for example, an AT&T user in Portland, Oregon can reach the Web site of a Bell South customer in Miami, Florida.
  • Network Access Quarantine Control (NAQC) - Network Access Quarantine Control (NAQC) is a Resource Kit tool in Windows Server 2003 and  Windows Server 2008 that allows administrators to prevent remote client computers from connecting to their network with machines that aren't secure.
  • network access server - A network access server (NAS) is a computer server that enables an independent service provider (ISP) to provide connected customers with Internet access.
  • Network Address Translation - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close