Browse Definitions :

Browse Definitions by Alphabet

NET - NIB

  • Network Management Definitions - This is a WhatIs.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • Network News Transfer Protocol - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • network node - A network node is an endpoint or redistribution connection point for data transmissions on a communications network that can process or forward transmissions to other nodes.
  • Network Node Manager - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network order - Endianness is a term that describes the order in which a sequence of bytes are stored in computer memory.
  • network packet - A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
  • Network PC - The Net PC (also referred to as the Network PC) is an industry specification for a low-cost personal computer designed for businesses and their network applications.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • network security - In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.
  • Network Service Access Point - The Network Service Access Point (NSAP) is one of two types of hierarchical addresses (the other type is the network entity title) used to implement Open Systems Interconnection (OSI) network layer addressing.
  • network service provider - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing overlays multiple virtual networks on top of a shared network.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • network switch - A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.
  • network tap - A network tap is an external monitoring device that mirrors the traffic that passes between two network nodes.
  • network terminating unit - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • network terminator 1 - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • Network Time Protocol - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
  • network tracking tool - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • network unified storage - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that makes it possible to run and manage files and applications from a single device.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • network visibility - Network visibility is an awareness of the components within and the data moving through an enterprise computer network.
  • network vulnerability scanning - A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
  • network-attached storage - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Network-attached storage (NAS) vocabulary quiz - How much do you know about the essential terminology related to network-attached storage (NAS)? Take our quiz to find out.
  • Networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • Networking Learning Guides - We've gathered a collection of our learning guides and tutorials on networking topics.
  • Networking Quizzes - We've gathered a collection of our quizzes to test your networking knowledge.
  • neural net processor - A neural net processor is a CPU that takes the modeled workings of how a human brain operates onto a single chip.
  • neurodiversity - Neurodiversity is the range of discrete variations in the nervous systems of individuals across the population, particularly in ways that are manifested in clusters of non-standard behaviors.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by monitoring brainwave activity, eye-tracking and skin response.
  • neuromorphic chip - A neuromorphic chip is an analog data processor inspired by the biological brain.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neuroscience - Neuroscience is the area of study concerning the makeup and functioning of the nervous system.
  • neurosynaptic chip (cognitive chip) - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • new collar jobs - New collar jobs are occupations which focus more on a candidate’s skills during the hiring process, rather than his or her level of education.
  • new product development - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • newb - A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.
  • Nework Address Translator - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • newsgroup - A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups.
  • newsjacking - Newsjacking is the practice of aligning a brand with a current event in an attempt to generate media attention and boost the brand's exposure.
  • NewSQL - NewSQL is a term coined by the analyst firm The 451 Group as shorthand to describe vendors of new, scalable, high performance SQL databases.
  • newton - The newton is the Standard International (SI) unit of force.
  • newton second - The newton-second is the standard unit of impulse.
  • newton-second - The newton-second is the standard unit of impulse.
  • newton-second - The newton-second is the standard unit of impulse.
  • NeXT - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • Next Generation Secure Computing Base - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • Next Generation Secure Computing Base (NGSCB) - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • Next Hop Resolution Protocol - In a computer network, the Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer.
  • Next Hop Resolution Protocol (NHRP) - In a computer network, the Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer.
  • next issue avoidance (NIA) - Next issue avoidance (NIA) is a metric used by a company's support or customer service department to stay proactive when helping their customers by predicting related issues that might arise.
  • Next Steps in Signaling - NSIS (Next Steps in Signaling) is an evolving communication protocol intended to facilitate signaling at the Transport layer, using a two-level model to support diverse services and resources.
  • next-generation firewall (NGFW) - A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • Nexus of Forces - The nexus of forces is a concept developed by consultancy Gartner Inc.
  • NFAT - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • NFC - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • NFR - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products.
  • NFS - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • NFTS - The national file tracking system (NFTS) is a centralized database for tracking the movement of immigration files.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • NGA Human Resources - NGA Human Resources, formerly NorthgateArinso, is a provider of human resources business process outsourcing (BPO) services and consulting.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NGO - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • NGO (non-governmental organization) - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • NGSCB - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • NHII - The National Health Information Infrastructure (NHII) was a government initiative first proposed under former President George W.
  • NHIN - The Nationwide Health Information Network (NHIN) is a set of standards, services and policies that enable secure health information exchange (HIE) over the Internet.
  • NHIN Direct - NHIN Direct is a project being developed by the Nationwide Health Information Network that aims to enable secure health information exchange (HIE) over the Internet for primary care physicians, specialists and public health agencies.
  • NHRP - In a computer network, the Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer.
  • NHS - The National Health Service (NHS) is the publicly funded national healthcare system in the United Kingdom.
  • Ni-Cd - The Nickel Cadmium (Ni-Cd) battery is a type of battery commonly used in portable computers, camcorders, portable drills, and other small battery-powered devices, having an effective and even power discharge.
  • Ni-Cd battery - The Nickel Cadmium (Ni-Cd) battery is a type of battery commonly used in portable computers, camcorders, portable drills, and other small battery-powered devices, having an effective and even power discharge.
  • Ni-MH - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • Ni-MH battery - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • Ni2 - Ni2 (Net indexer 2) is the indexer for the AltaVista public search engine.
  • Ni2 (Net indexer 2) - Ni2 (Net indexer 2) is the indexer for the AltaVista public search engine.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

  • Kerberos

    Kerberos is a protocol for authenticating service requests between trusted hosts across an untrusted network, such as the ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close