Browse Definitions :

Browse Definitions by Alphabet

NIB - NOR

  • nibble - In computers and digital technology, a nibble (pronounced NIHB-uhl; sometimes spelled nybble) is four binary digits or half of an eight-bit byte.
  • nibble - A quadbit, sometimes called a nibble, is one of 16 possible four-bit combinations used in some communication signals.
  • NIC - A network interface card (NIC) is a hardware component, typically a circuit board or chip, that is installed on a computer so that it can connect to a network.
  • NIC handle - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • NiCd - The Nickel Cadmium (Ni-Cd) battery is a type of battery commonly used in portable computers, camcorders, portable drills, and other small battery-powered devices, having an effective and even power discharge.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • niche marketing - Niche marketing is a targeted marketing strategy aimed at small, specific and well-defined portions of the population.
  • niche off-the-shelf - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • Nickel-Cadmium battery - The Nickel Cadmium (Ni-Cd) battery is a type of battery commonly used in portable computers, camcorders, portable drills, and other small battery-powered devices, having an effective and even power discharge.
  • Nickel-Metal Hydride - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • Nickel-Metal Hydride battery - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • NIDS - Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks.
  • Nifty (NSE Nifty) - The S&P CNX Nifty (also known as NSE Nifty or NSE-50 or 'Nifty'), is the benchmark index used by the National Stock Exchange (NSE).
  • night vision - Night vision is technology that provides users with some vision in total darkness and improved vision in low-light environments.
  • NIH - The National Institutes of Health (NIH) is the principal federal agency for health research in the United States.
  • NII Consulting - Network Intelligence India Pvt.
  • Nikola Tesla - Nikola Tesla was a Serbian-American scientist, electrical engineer, and inventor whose research laid much of the groundwork for modern electrical and communication systems.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • Nimboxx Inc. - Nimboxx Inc.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the Internet, spreading through four different methods, infecting computers containing Microsoft's Web server, Internet Information Server (IIS), and computer users who opened an e-mail attachment.
  • NiMH - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • nine-box grid - The nine-box grid is a human resource management (HRM) tool used by supervisors to rate the performance and potential of employees.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • Nintex Sign - Nintex Sign is a native electronic signature capability that is powered by Adobe Sign.
  • NIPS - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • NIS - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS+ - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST (National Institute of Standards and Technology) - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST 800 Series - The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.
  • NIST F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • NIST Privacy Framework - The NIST Privacy Framework is a voluntary tool created by the National Institute of Standards and Technology, which lays out strategies for private sector organizations to improve their data risk management practices.
  • NIST-F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • nit - In information technology as elsewhere, a nit (pronounced NIHT) is a small, usually unimportant imperfection in something.
  • NIU - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • NJE - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • NKO - Navy Knowledge Online (NKO) is the United States Navy intranet.
  • NLM - The U.S.
  • NLP - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • NNI - The National Nanotechnology Initiative (NNI) is a research-and development (R & D) program funded by the U.
  • NNM - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • NNTP - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • no op - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no op (no operation) - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no operation - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no-code - No-code is a software development approach that requires few, if any, programming skills to quickly build an application.
  • no-fly zone - A no-fly zone is a geographic location over which aircraft cannot fly.
  • no-swipe credit card - A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine.
  • NOAA Weather Radio - NOAA Weather Radio (NWR) is an emergency broadcasting system operated by the U.
  • NOC - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • Node.js - Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.
  • nofollow - Nofollow is a meta tag that can be added to a site’s robots.
  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy channel model - The noisy channel model is a framework used in natural language processing (NLP) to identify the correct word in situations where it is unclear.
  • noisy data - Noisy data is meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • Nokia Lumia - Nokia Lumia is a series of touch-based Windows Phone 7 and Windows Phone 8 smartphones that debuted in 2011.
  • nomadic computing - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • non broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non return to zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non-compete agreement (NCA) - A non-compete agreement (NCA) is a legally binding restrictive covenant designed to prevent the signee from exploiting competitive advantages gained through association with the other party in the agreement.
  • non-disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disruptive data migration - Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.
  • non-disruptive upgrade (NDU) - A non-disruptive upgrade (NDU) is an update to software or hardware done without interruption to system service or data access.
  • non-governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non-heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non-impact - Test yourself.
  • non-interlaced display - A non-interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned sequentially from the top to the bottom of the screen.
  • non-practicing entity (NPE) - A non-practicing entity (NPE) is someone who holds a patent for a product or process but has no intentions of developing it.
  • non-profit organization (NPO) - A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • non-renewable resource - A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way.
  • non-repudiation - Nonrepudiation is the assurance that someone cannot deny something, such as the receipt of a message or the authenticity of a statement or contract.
  • non-return-to-zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non-uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile storage - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonce - A nonce is a random or semi-random number that is generated for a specific use, typically related to cryptographic communication or information technology.
  • nonfungible token (NFT) - A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets.
  • nonlinearity - Nonlinearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength does not vary in direct proportion to the input signal strength.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B spline - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonuniform rational B-spline - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonuniform rational B-spline (NURBS) - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonvolatile RAM - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonvolatile storage - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • noob - A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.
  • NoOps - NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house.
  • NOR - A logic gate is an elementary building block of a digital circuit.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • email spam

    Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.

  • shadow password file

    A shadow password file, also known as /etc/shadow, is a system file in Linux that stores encrypted user passwords and is ...

  • browser hijacker (browser hijacking)

    A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • bare-metal restore

    A bare-metal restore (also referred to as bare-metal recovery or bare-metal backup) is a data recovery and restoration process ...

  • mSATA SSD (mSATA solid-state drive)

    An mSATA SSD is a solid-state drive (SSD) that conforms to the mSATA interface specification developed by the Serial ATA (SATA) ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close