Browse Definitions :

Browse Definitions by Alphabet

NIM - NOU

  • Nimboxx Inc. - Nimboxx Inc.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
  • NiMH - The Nickel-Metal Hydride (Ni-MH) battery is a rechargeable power source that is increasingly used in portable computers and other devices.
  • nine-box grid - The nine-box grid is a human resource management (HRM) tool used by supervisors to rate the performance and potential of employees.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • Nintex Sign - Nintex Sign is a native electronic signature capability that is powered by Adobe Sign.
  • NIPS - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • NIS - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIS+ - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST (National Institute of Standards and Technology) - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST 800 Series - The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.
  • NIST F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • NIST Privacy Framework - The NIST Privacy Framework is a voluntary tool created by the National Institute of Standards and Technology, which lays out strategies for private sector organizations to improve their data risk management practices.
  • NIST-F1 - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • NIU - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • NJE - Network Job Entry (NJE) is an application designed for the transfer of commands, messages, programs, and jobs among different computing systems in a network.
  • NKO - Navy Knowledge Online (NKO) is the United States Navy intranet.
  • NLM - The U.S.
  • NLP - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • NNI - The National Nanotechnology Initiative (NNI) is a research-and development (R & D) program funded by the U.
  • NNM - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • NNTP - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • no op - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no op (no operation) - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no operation - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
  • no-code - No-code is a software development approach that requires few, if any, programming skills to quickly build an application.
  • no-fly zone - A no-fly zone is a geographic location over which aircraft cannot fly.
  • no-swipe credit card - A no-swipe credit card is a credit card equipped with a radio frequency (RF) transponder that allows for purchases without the need for passing the card through a traditional magnetic-stripe detection machine.
  • NOAA Weather Radio - NOAA Weather Radio (NWR) is an emergency broadcasting system operated by the U.
  • NOC - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • Node.js - Node.js, often called simply "Node" in conversation, is a development platform built on top of Google's V8 JavaScript virtual machine.
  • nofollow - Nofollow is a meta tag that can be added to a site’s robots.
  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy channel model - The noisy channel model is a framework used in natural language processing (NLP) to identify the correct word in situations where it is unclear.
  • noisy data - Noisy data is meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • Nokia Lumia - Nokia Lumia is a series of touch-based Windows Phone 7 and Windows Phone 8 smartphones that debuted in 2011.
  • nomadic computing - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • non broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non return to zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-broadcast multiple access - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • non-compete agreement (NCA) - A non-compete agreement (NCA) is a legally binding restrictive covenant designed to prevent the signee from exploiting competitive advantages gained through association with the other party in the agreement.
  • non-disclosure agreement - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disruptive data migration - Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.
  • non-disruptive upgrade (NDU) - A non-disruptive upgrade (NDU) is an update to software or hardware done without interruption to system service or data access.
  • non-governmental organization - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • non-heatset - Coldset Web offset printing (also known as non-heatset) is a Web offset printing process in which ink is allowed to dry naturally through evaporation and absorption.
  • non-interlaced display - A non-interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned sequentially from the top to the bottom of the screen.
  • non-practicing entity (NPE) - A non-practicing entity (NPE) is someone who holds a patent for a product or process but has no intentions of developing it.
  • non-profit organization (NPO) - A non-profit organization (NPO) is one which is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • non-renewable resource - A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way.
  • non-repudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • non-return-to-zero - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • non-uniform memory access - NUMA (non-uniform memory access) is a method of configuring a cluster of microprocessor in a multiprocessing system so that they can share memory locally, improving performance and the ability of the system to be expanded.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile storage - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonce - A nonce is a random or semi-random number that is generated for a specific use.
  • nonfungible token (NFT) - A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets.
  • nonlinearity - Nonlinearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength does not vary in direct proportion to the input signal strength.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B spline - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonuniform rational B-spline - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonuniform rational B-spline (NURBS) - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • nonvolatile RAM - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonvolatile storage - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • noob - A newbie (pronounced NOO-bee) is a novice or neophyte: anyone who is new to any particular type of endeavor, such as a sport or a technology.
  • NoOps - NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house.
  • NOR - A logic gate is an elementary building block of a digital circuit.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • normal distribution - A normal distribution is an arrangement of a data set in which most values cluster in the middle of the range and the rest taper off symmetrically toward either end.
  • normal forms - Database normalization is intrinsic to most relational database schemes.
  • North American Electric Reliability Corporation - North American Electric Reliability Corporation (NERC) is an institution that oversees and regulates the reliability of the North American electrical grids.
  • North American Electric Reliability Corporation (NERC) - North American Electric Reliability Corporation (NERC) is an institution that oversees and regulates the reliability of the North American electrical grids.
  • northbound interface / southbound interface - A northbound interface is an interface that allows a particular component of a network to communicate with a higher-level component.
  • Northbridge - Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities.
  • NOS - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • NoSQL - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • NoSQL (Not Only SQL database) - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • NoSQL DBMS (Not only SQL database management system) - Understanding the types of NoSQL DBMSes that are available is an important requirement for modern application development.
  • NOT - A logic gate is an elementary building block of a digital circuit.
  • not acknowledged - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • not element-of symbol - The element-of symbol is used in mathematical set theory to indicate that a point, object, or number belongs to a certain set.
  • not for resale - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products.
  • not for resale (NFR) - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products.
  • not invented here (NIH) syndrome - Not invented here (NIH) syndrome is the name of the tendency for management to resist change by overlooking processes or solutions discovered outside of the company.
  • Not Only SQL - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.
  • NOTS - COTS, MOTS, GOTS, and NOTS are abbreviations that describe pre-packaged software or hardware purchase alternatives.
  • noun - A noun is a word used to identify an entity, a place, a thing or a concept; respectively, for example, Grace Hopper, Silicon Valley, a smartphone and synchronicity.
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

  • black hat hacker

    A black hat hacker has been historically used to describe one who has malicious intent -- such as theft of information, fraud or ...

  • cookie poisoning

    Cookie poisoning is a type of cyber attack in which a bad actor hijacks, forges, alters or manipulates a cookie to gain ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close