Browse Definitions :

Browse Definitions by Alphabet

NET - NEX

  • network analytics - Network analytics is the application of big data principles and tools to the management and security of data networks.
  • network analyzer - A network analyzer is a combination of hardware and programming, or in some cases a stand-alone hardware device, that can be installed in a computer or network to enhance protection against malicious activity.
  • network analyzer (protocol analyzer or packet analyzer) - A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.
  • network appliance - An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
  • Network as a Service (NaaS) - Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.
  • network attached storage - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • network attack surface - Every point of network interaction is a part of the network attack surface.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • Network Based Application Recognition - Network Based Application Recognition (NBAR) is a mechanism that classifies and regulates bandwidth for network applications to ensure that available resources are utilized as efficiently as possible.
  • Network Basic Input Output System - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • Network Basic IO System - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • network behavior anomaly detection - Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or extraordinary trends.
  • network behavior anomaly detection (NBAD) - Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or extraordinary trends.
  • network configuration management - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • Network Driver Interface Specification - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • Network File System (NFS) - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.
  • network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
  • network hypervisor - A network hypervisor is a program that provides an abstraction layer for network hardware.
  • Network Information System - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • Network Intelligence India - Network Intelligence India Pvt.
  • Network Intelligence India Pvt Ltd - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. (NII Consulting) - Network Intelligence India Pvt.
  • network interface card - A network interface card (NIC) is a hardware component, typically a circuit board or chip, that is installed on a computer so that it can connect to a network.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
  • Network interface device - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit (NIU or Network Interface Device) - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network intrusion protection system - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • network load balancing - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • network node - A computer network is a system of computers and computing devices that are connected via communication links.
  • Network Node Manager - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network order - Endianness is a term that describes the order in which a sequence of bytes are stored in computer memory.
  • network packet - A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • network security - In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.
  • network service provider - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing overlays multiple virtual networks on top of a shared network.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • network switch - A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.
  • network tap - A network tap is an external monitoring device that mirrors the traffic that passes between two network nodes.
  • Network Time Protocol - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • network unified storage - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that makes it possible to run and manage files and applications from a single device.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • network visibility - Network visibility is an awareness of the components and data within an enterprise computer network.
  • network vulnerability scanning - A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
  • network-attached storage - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Network-attached storage (NAS) vocabulary quiz - How much do you know about the essential terminology related to network-attached storage (NAS)? Take our quiz to find out.
  • Networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • Networking Learning Guides - We've gathered a collection of our learning guides and tutorials on networking topics.
  • neural net processor - A neural net processor is a CPU that takes the modeled workings of how a human brain operates onto a single chip.
  • neurodiversity - Neurodiversity is the range of discrete variations in the nervous systems of individuals across the population, particularly in ways that are manifested in clusters of non-standard behaviors.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by monitoring brainwave activity, eye-tracking and skin response.
  • neuromorphic chip - A neuromorphic chip is an analog data processor inspired by the biological brain.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neuroscience - Neuroscience is the area of study concerning the makeup and functioning of the nervous system.
  • neurosynaptic chip (cognitive chip) - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • new collar jobs - New collar jobs are occupations which focus more on a candidate’s skills during the hiring process, rather than his or her level of education.
  • new product development - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • Nework Address Translator - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • newsgroup - A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups.
  • newsjacking - Newsjacking is the practice of aligning a brand with a current event in an attempt to generate media attention and boost the brand's exposure.
  • NewSQL - NewSQL is a term coined by the analyst firm The 451 Group as shorthand to describe vendors of new, scalable, high performance SQL databases.
  • newton - The newton is the Standard International (SI) unit of force.
  • newton second - The newton-second is the standard unit of impulse.
  • newton-second - The newton-second is the standard unit of impulse.
  • newton-second - The newton-second is the standard unit of impulse.
  • NeXT - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • Next Generation Secure Computing Base - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close