Browse Definitions :

Browse Definitions by Alphabet

NET - NO

  • Netflix Spinnaker - Netflix Spinnaker is an open source, multi-cloud continuous delivery application that can be used to release software updates rapidly and efficiently.
  • NetFlow - NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.
  • netiquette - Netiquette is etiquette on the Internet.
  • netizen - The word netizen seems to have two similar meanings.
  • NetScaler (SDX) - Citrix NetScaler SDX is a service delivery networking platform for enterprise and cloud datacenters.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • NetSuite - NetSuite is a business technology vendor based in San Mateo, California.
  • network access control (NAC) - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
  • network access point (NAP) - In the United States, a network access point (NAP) is one of several major Internet interconnection points that serve to tie all the Internet access providers together so that, for example, an AT&T user in Portland, Oregon can reach the Web site of a Bell South customer in Miami, Florida.
  • Network Access Quarantine Control (NAQC) - Network Access Quarantine Control (NAQC) is a Resource Kit tool in Windows Server 2003 and  Windows Server 2008 that allows administrators to prevent remote client computers from connecting to their network with machines that aren't secure.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
  • network analyzer (protocol analyzer or packet analyzer) - A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.
  • Network as a Service (NaaS) - Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.
  • network attack surface - Every point of network interaction is a part of the network attack surface.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network behavior anomaly detection (NBAD) - Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or extraordinary trends.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol (NDMP) - Network Data Management Protocol (NDMP) is an open protocol to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network downtime - Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System (NFS) - Network File System (NFS) is a networking protocol for distributed file sharing.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.
  • network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
  • network hypervisor - A network hypervisor is a program that provides an abstraction layer for network hardware.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
  • network interface unit (NIU or Network Interface Device) - A network interface unit (NIU) (sometimes called a network interface device) is a device that serves as a common interfacefor various other devices within a local area network (LAN), or as an interface to allow networked computers to connect to an outside network.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • network management - A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network node - A computer network is a system of computers and computing devices that are connected via communication links.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network orchestration - Network orchestration is a policy-driven approach to network automation that coordinates the hardware and software components a software application or service requires to run.
  • network packet - A network packet is a small amount of data sent over Transmission Control Protocol/Internet Protocol (TCP/IP) networks.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • network security - In information technology, network security is the act of maintaining the integrity of a computer network and the data within it.
  • network segmentation - Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing overlays multiple virtual networks on top of a shared network domain, that is, a set of shared network and computing resources.
  • network socket - Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API).
  • network switch - A network switch is a hardware device that channels incoming data from multiple input ports to a specific output port that will take it toward its intended destination.
  • network tap - A network tap is an external monitoring device that mirrors the traffic that passes between two network nodes.
  • Network Time Protocol (NTP) - Network Time Protocol (NTP) is an internet protocol used to synchronize with computer clock time sources in a network.
  • network topology - A network topology is the physical and logical arrangement of nodes and connections in a network.
  • network traffic - Network traffic, sometimes referred to as data traffic, is the amount of data which moves across a network during any given time.
  • network visibility - Network visibility is an awareness of the components and data within an enterprise computer network.
  • network vulnerability scanning - A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • Networking (computer) - Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared medium in an information system.
  • neural net processor - A neural net processor is a CPU that takes the modeled workings of how a human brain operates onto a single chip.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
  • neuromorphic chip - A neuromorphic chip is an analog data processor inspired by the biological brain.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neuroscience - Neuroscience is the area of study concerning the makeup and functioning of the nervous system.
  • neurosynaptic chip (cognitive chip) - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that functions more like a biological brain than a typical CPU does.
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • newsgroup - A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups.
  • newsjacking - Newsjacking is the practice of aligning a brand with a current event in an attempt to generate media attention and boost the brand's exposure.
  • NewSQL - NewSQL is a term coined by the analyst firm The 451 Group as shorthand to describe vendors of new, scalable, high performance SQL databases.
  • newton - The newton is the Standard International (SI) unit of force.
  • newton-second - The newton-second is the standard unit of impulse.
  • Next Generation Secure Computing Base (NGSCB) - The Next Generation Secure Computing Base (NGSCB) is a part of the Microsoft Vista operating system (OS) that employs a trusted platform module (TPM), a specialized chip that can be installed on the motherboard of a personal computer (PC) or server for the purpose of hardware authentication.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • next issue avoidance (NIA) - Next issue avoidance (NIA) is a metric used by a company's support or customer service department to stay proactive when helping their customers by predicting related issues that might arise.
  • next-generation firewall (NGFW) - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • Nexus of Forces - The nexus of forces is a concept developed by consultancy Gartner Inc.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • NGA Human Resources - NGA Human Resources, formerly NorthgateArinso, is a provider of human resources business process outsourcing (BPO) services and consulting.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • NGO (non-governmental organization) - NGO definition: A non-governmental organization (NGO) is a citizen-based association that operates independently of government, usually to deliver resources or serve some social or political purpose.
  • nibble - In computers and digital technology, a nibble (pronounced NIHB-uhl; sometimes spelled nybble) is four binary digits or half of an eight-bit byte.
  • niche app - A niche app is a specialized application, typically designed with social networking built in and optimized for mobile devices.
  • niche marketing - Niche marketing is a targeted marketing strategy aimed at small, specific and well-defined portions of the population.
  • night vision - Night vision is technology that provides users with some vision in total darkness and improved vision in low-light environments.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
  • nine-box grid - The nine-box grid is a human resource management (HRM) tool used by supervisors to rate the performance and potential of employees.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • Nintex Sign - Nintex Sign is a native electronic signature capability that is powered by Adobe Sign.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST (National Institute of Standards and Technology) - NIST is the National Institute of Standards and Technology, a unit of the U.
  • NIST 800 Series - The NIST 800 Series is a set of documents that describe United States federal government computer security policies, procedures and guidelines.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (NIST CSF) is a policy framework surrounding IT infrastructure security.
  • NIST Privacy Framework - The NIST Privacy Framework is a voluntary tool created by the National Institute of Standards and Technology, which lays out strategies for private sector organizations to improve their data risk management practices.
  • no op (no operation) - A no op (or no-op), for no operation, is a computer instruction that takes up a small amount of space but specifies no operation.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchCIO
  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

  • chief data officer (CDO)

    A chief data officer (CDO) in many organizations is a C-level executive whose position has evolved into a range of strategic data...

  • information technology (IT) director

    An information technology (IT) director is the person in charge of technology within an organization. IT directors manage ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close