Browse Definitions :

Browse Definitions by Alphabet

NEX - NON

  • Next Generation Secure Computing Base (NGSCB) - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • Next Hop Resolution Protocol - In a computer network, the Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • next issue avoidance (NIA) - Next issue avoidance (NIA) is a metric used by a company's support or customer service department to stay proactive when helping their customers by predicting related issues that might arise.
  • next-generation firewall (NGFW) - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • Nexus of Forces - The nexus of forces is a concept developed by consultancy Gartner Inc.
  • NFAT - An infinite sequence is a list or string of discrete objects, usually numbers, that can be paired off one-to-one with the set of positive integers {1, 2, 3,.
  • NFC - Near Field Communication (NFC) is a short-range wireless connectivity standard (Ecma-340, ISO/IEC 18092) that uses magnetic field induction to enable communication between devices when they're touched together, or brought within a few centimeters of each other.
  • NFR - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products.
  • NFS - The Network File System (NFS) is a client/server application that lets a computer user view and optionally store and update files on a remote computer as though they were on the user's own computer.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • NGA Human Resources - NGA Human Resources, formerly NorthgateArinso, is a provider of human resources business process outsourcing (BPO) services and consulting.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NGO - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • NGO (non-governmental organization) - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • NGSCB - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • NHII - The National Health Information Infrastructure (NHII) was a government initiative first proposed under former President George W.
  • NHIN - The Nationwide Health Information Network (NHIN) is a set of standards, services and policies that enable secure health information exchange (HIE) over the Internet.
  • NHIN Direct - NHIN Direct is a project being developed by the Nationwide Health Information Network that aims to enable secure health information exchange (HIE) over the Internet for primary care physicians, specialists and public health agencies.
  • NHRP - In a computer network, the Next Hop Resolution Protocol (NHRP) is a protocol or method that can be used so that a computer sending data to another computer can learn the most direct route (the fewest number of hops) to the receiving computer.
  • Ni2 - Ni2 (Net indexer 2) is the indexer for the AltaVista public search engine.
  • Ni2 (Net indexer 2) - Ni2 (Net indexer 2) is the indexer for the AltaVista public search engine.
  • nibble - In computers and digital technology, a nibble (pronounced NIHB-uhl; sometimes spelled nybble) is four binary digits or half of an eight-bit byte.
  • nibble - A quadbit, sometimes called a nibble, is one of 16 possible four-bit combinations used in some communication signals.
  • NIC - A network interface card (NIC) is a hardware component, typically a circuit board or chip, that is installed on a computer so that it can connect to a network.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • niche marketing - Niche marketing is a targeted marketing strategy aimed at small, specific and well-defined portions of the population.
  • niche off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • night vision - Night vision is technology that provides users with some vision in total darkness and improved vision in low-light environments.
  • NIH - The National Institutes of Health (NIH) is the principal federal agency for health research in the United States.
  • NII Consulting - Network Intelligence India Pvt.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • Nimboxx Inc. - Nimboxx Inc.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
  • nine-box grid - The nine-box grid is a human resource management (HRM) tool used by supervisors to rate the performance and potential of employees.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • Nintex Sign - Nintex Sign is a native electronic signature capability that is powered by Adobe Sign.
  • NIPS - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • NIS - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS+ - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST (National Institute of Standards and Technology) - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST 800 Series - The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.
  • NIST F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • NIST Privacy Framework - The NIST Privacy Framework is a voluntary tool created by the National Institute of Standards and Technology, which lays out strategies for private sector organizations to improve their data risk management practices.
  • NIST-F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • NIU - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • NLM - The U.S.
  • NLP - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • NNI - The National Nanotechnology Initiative (NNI) is a research-and development (R & D) program funded by the U.
  • NNM - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • no op - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no op (no operation) - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no operation - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no-code - No-code is a software development approach that requires few, if any, programming skills to quickly build an application.
  • no-fly zone - A no-fly zone is a geographic location over which aircraft cannot fly.
  • no-swipe credit card - A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine.
  • NOC - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • Node.js - Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.
  • nofollow - Nofollow is a meta tag that can be added to a site’s robots.
  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy channel model - The noisy channel model is a framework used in natural language processing (NLP) to identify the correct word in situations where it is unclear.
  • noisy data - Noisy data is meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • nomadic computing - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • non broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non return to zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non-compete agreement (NCA) - A non-compete agreement (NCA) is a legally binding restrictive covenant designed to prevent the signee from exploiting competitive advantages gained through association with the other party in the agreement.
  • non-disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disruptive data migration - Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.
  • non-disruptive upgrade (NDU) - A non-disruptive upgrade (NDU) is an update to software or hardware done without interruption to system service or data access.
  • non-governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non-heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non-interlaced display - A non-interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned sequentially from the top to the bottom of the screen.
  • non-practicing entity (NPE) - A non-practicing entity (NPE) is someone who holds a patent for a product or process but has no intentions of developing it.
  • non-profit organization (NPO) - A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • non-renewable resource - A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way.
  • non-repudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • non-return-to-zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non-uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile storage - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonce - A nonce is a random or semi-random number that is generated for a specific use.
  • nonfungible token (NFT) - A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets.
  • nonlinearity - Nonlinearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength does not vary in direct proportion to the input signal strength.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B spline - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close