Browse Definitions :

Browse Definitions by Alphabet

NET - NEW

  • network configuration management - Network configuration management is the process of organizing and maintaining information about all the components of a computer network.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol - NDMP (Network Data Management Protocol) is an open protocol used to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network device management program - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • Network Driver Interface Specification - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • network encryption - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network encryption (network layer or network level encryption) - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update file on a remote computer as though they were on the user's own computer.
  • Network File System (NFS) - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • network forensics - Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is an initiative to virtualize network services traditionally run on proprietary, dedicated hardware.
  • network hypervisor - A network hypervisor is a program that provides an abstraction layer for network hardware.
  • Network Information Center handle - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Network Information System - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • network intelligence (NI) - Network Intelligence (NI) is the capacity of a network to examine data packets continuously and in real time.
  • Network Intelligence India - Network Intelligence India Pvt.
  • Network Intelligence India Pvt Ltd - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. - Network Intelligence India Pvt.
  • Network Intelligence India Pvt. Ltd. (NII Consulting) - Network Intelligence India Pvt.
  • network interface card - A network interface card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, that is installed on a computer so that it can connect to a network.
  • Network interface device - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network interface unit (NIU or Network Interface Device) - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network intrusion detection system - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • network intrusion detection systems - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • network intrusion protection system - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network Job Entry - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • Network Job Entry (NJE) - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • network layer - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the network layer's primary function is to move data into and through other networks.
  • network level encryption - Network encryption (sometimes called network layer, or network level encryption) is a network security process that applies crypto services at the network transfer layer - above the data link level, but below the application level.
  • network load balancing - Load balancing is a technique used to distribute workloads uniformly across servers or other compute resources to optimize network efficiency, reliability and capacity.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • Network Management Definitions - This is a WhatIs.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network neutrality - Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
  • Network News Transfer Protocol - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • network node - A network node is an endpoint or redistribution connection point for data transmissions on a communications network that can process or forward transmissions to other nodes.
  • Network Node Manager - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system - A network operating system (NOS) is a computer operating system system that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center - A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network.
  • network operations center (NOC) - A network operations center (NOC) is a place from which administrators supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network order - Big-endian and little-endian are terms that describe the order in which a sequence of bytes are stored in computer memory.
  • network packet - A packet is the unit of data that is routed between an origin and a destination on the Internet or any other packet-switched network.
  • Network PC - The Net PC (also referred to as the Network PC) is an industry specification for a low-cost personal computer designed for businesses and their network applications.
  • network PC - A network PC (sometimes called an appliance) is a term used to denote a new kind of relatively low-cost PC designed for Internet access and specialized business use, but without the full capabilities ot today's personal computer and software.
  • network perimeter - A network perimeter is the boundary between the private and locally managed-and-owned side of a network and the public and usually provider-managed side of a network.
  • network protocols - Network protocols are sets of established rules that dictate how to format, transmit and receive data so computer network devices -- from servers and routers to endpoints -- can communicate regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • Network Service Access Point - The Network Service Access Point (NSAP) is one of two types of hierarchical addresses (the other type is the network entity title) used to implement Open Systems Interconnection (OSI) network layer addressing.
  • Network Service Access Point (NSAP) - The Network Service Access Point (NSAP) is one of two types of hierarchical addresses (the other type is the network entity title) used to implement Open Systems Interconnection (OSI) network layer addressing.
  • network service provider - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing is the separation of multiple virtual networks that operate on the same physical hardware for different applications, services or purposes.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • network tap - A network tap is an external monitoring device that mirrors the traffic that passes between two network nodes.
  • network terminating unit - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • network terminator 1 - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • network terminator 1 (NT1) - Using the Integrated Services Digital Network (ISDN) Basic Rate Interchange (Basic Rate Interface in ISDN) service, an NT1 (network terminating unit is a device that accepts a two-wire signal from the phone company and converts it to a four-wire signal that sends and receives to and from devices within the home or business.
  • Network Time Protocol - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is a protocol used to synchronize computer clock times in a network.
  • network topology - A network topology is the arrangement of nodes -- usually switches, routers, or software switch/router features -- and connections in a network, often represented as a graph.
  • network tracking tool - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network tracking tool (network device management program) - A network tracking tool, also called a network device management program, is a program that helps a network administrator keep track of moves, additions, and changes (known as MACs) to the hardware infrastructure of a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • network unified storage - Unified storage -- sometimes called network unified storage or multiprotocol storage -- is a storage system that runs and manages files and applications from a single device.
  • network virtualization - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between virtual machines (VMs).
  • network vulnerability scanning - A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
  • network-attached storage - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Network-attached storage (NAS) vocabulary quiz - How much do you know about the essential terminology related to network-attached storage (NAS)? Take our quiz to find out.
  • Networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • Networking Cheat Sheets - We've gathered our cheat sheets for fast reference to networking technology information.
  • networking chip - A networking chip is a microprocessor that provides the logic for sending and receiving data (including voice and video) on a telecommunications network so that additional devices are not needed for these functions.
  • Networking Quizzes - We've gathered a collection of our quizzes to test your networking knowledge.
  • Netzip - Netzip is a plug-in for Web browsers that allows you to view the files within a zip file from within your browser without the need to launch an external application.
  • neural net processor - A neural net processor is a CPU that takes the modeled workings of how a human brain operates onto a single chip.
  • neurodiversity - Neurodiversity is the range of discrete variations in the nervous systems of individuals across the population, particularly in ways that are manifested in clusters of non-standard behaviors.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by monitoring brainwave activity, eye-tracking and skin response.
  • neuromorphic chip - A neuromorphic chip is an analog data processor inspired by the biological brain.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neuroscience - Neuroscience is the area of study concerning the makeup and functioning of the nervous system.
  • neurosynaptic chip (cognitive chip) - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.
  • neutrino - A neutrino is a sub atom ic particle with no electric charge.
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • new collar jobs - New collar jobs are occupations which focus more on a candidate’s skills during the hiring process, rather than his or her level of education.
  • new media - New media is a catch-all term for all forms of electronic communication that have appeared or will appear since the original mainly text-and-static picture forms of online communication.
  • new product development - Product development, or new product development (NPD), is the process of bringing new or updated products or services to a target market through a systematic approach to idea creation, design, marketing and commercialization.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close