Browse Definitions :

Browse Definitions by Alphabet

NET - NEW

  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network device management program - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • Network Driver Interface Specification - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • network encryption - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network encryption (network layer or network level encryption) - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update file on a remote computer as though they were on the user's own computer.
  • Network File System (NFS) - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • network forensics - Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.
  • network hypervisor - A network hypervisor is a program that provides an abstraction layer for network hardware.
  • Network Information Center handle - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Network Information System - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • network intelligence (NI) - Network Intelligence (NI) is the capacity of a network to examine data packets continuously and in real time.
  • Network Intelligence India - Network Intelligence India Pvt.
  • Network Intelligence India Pvt Ltd - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. (NII Consulting) - Network Intelligence India Pvt.
  • network interface card - A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, that is installed on a computer so that it can connect to a network.
  • Network interface device - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit (NIU or Network Interface Device) - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network intrusion detection system - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • network intrusion detection systems - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • network intrusion protection system - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network Job Entry - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • Network Job Entry (NJE) - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • network layer - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks.
  • network level encryption - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network load balancing - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • Network Management Definitions - This is a WhatIs.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network neutrality - Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
  • Network News Transfer Protocol - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • network node - A network node is an endpoint or redistribution connection point for data transmissions on a communications network that can process or forward transmissions to other nodes.
  • Network Node Manager - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system - A network operating system (NOS) is a computer operating system system that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center - A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network.
  • network operations center (NOC) - A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network order - Big-endian and little-endian are terms that describe the order in which a sequence of bytes are stored in computer memory.
  • network packet - A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
  • Network PC - The Net PC (also referred to as the Network PC) is an industry specification for a low-cost personal computer designed for businesses and their network applications.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • network protocols - Network protocols are sets of established rules that dictate how to format, transmit and receive data so computer network devices -- from servers and routers to endpoints -- can communicate regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • network security - In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.
  • Network Service Access Point - The Network Service Access Point (NSAP) is one of two types of hierarchical addresses (the other type is the network entity title) used to implement Open Systems Interconnection (OSI) network layer addressing.
  • Network Service Access Point (NSAP) - The Network Service Access Point (NSAP) is one of two types of hierarchical addresses (the other type is the network entity title) used to implement Open Systems Interconnection (OSI) network layer addressing.
  • network service provider - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing overlays multiple virtual networks on top of a shared network.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • network switch - A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.
  • network tap - A network tap is an external monitoring device that mirrors the traffic that passes between two network nodes.
  • network terminating unit - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • network terminator 1 - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • network terminator 1 (NT1) - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • Network Time Protocol - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • network topology - A network topology is the arrangement of nodes -- usually switches, routers, or software switch/router features -- and connections in a network, often represented as a graph.
  • network tracking tool - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network tracking tool (network device management program) - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • network unified storage - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that runs and manages files and applications from a single device.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • network visibility - Network visibility is an awareness of the components within and the data moving through an enterprise computer network.
  • network vulnerability scanning - A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
  • network-attached storage - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Network-attached storage (NAS) vocabulary quiz - How much do you know about the essential terminology related to network-attached storage (NAS)? Take our quiz to find out.
  • Networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • Networking Cheat Sheets - We've gathered our cheat sheets for fast reference to networking technology information.
  • networking chip - A networking chip is a microprocessor that provides the logic for sending and receiving data (including voice and video) on a telecommunications network so that additional devices are not needed for these functions.
  • Networking Learning Guides - We've gathered a collection of our learning guides and tutorials on networking topics.
  • Networking Quizzes - We've gathered a collection of our quizzes to test your networking knowledge.
  • Netzip - Netzip is a plug-in for Web browsers that allows you to view the files within a zip file from within your browser without the need to launch an external application.
  • neural net processor - A neural net processor is a CPU that takes the modeled workings of how a human brain operates onto a single chip.
  • neurodiversity - Neurodiversity is the range of discrete variations in the nervous systems of individuals across the population, particularly in ways that are manifested in clusters of non-standard behaviors.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by monitoring brainwave activity, eye-tracking and skin response.
  • neuromorphic chip - A neuromorphic chip is an analog data processor inspired by the biological brain.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neuroscience - Neuroscience is the area of study concerning the makeup and functioning of the nervous system.
  • neurosynaptic chip (cognitive chip) - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.
  • neutrino - A neutrino is a sub atom ic particle with no electric charge.
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • new collar jobs - New collar jobs are occupations which focus more on a candidate’s skills during the hiring process, rather than his or her level of education.

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close