Browse Definitions :

Browse Definitions by Alphabet

  • neural network - A neural network is a machine learning (ML) model designed to mimic the function and structure of the human brain.
  • neural radiance field (NeRF) - Neural radiance fields (NeRF) are a technique that generates 3D representations of an object or scene from 2D images by using advanced machine learning.
  • neuro-symbolic AI - Neuro-symbolic AI combines neural networks with rules-based symbolic processing techniques to improve artificial intelligence systems' accuracy, explainability and precision.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neurosynaptic chip - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that is designed to function more like a biological brain than a typical central processing unit (CPU).
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • newsgroup - A newsgroup is an online discussion forum where users can post messages, exchange ideas and read the comments of others.
  • newton-second - The newton-second is the standard unit of impulse.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • next-generation firewall (NGFW) - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • nibble - In computing and digital technology, a nibble is four consecutive binary digits or half of an 8-bit byte.
  • NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) - The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST (National Institute of Standards and Technology) - NIST (National Institute of Standards and Technology) is a nonregulatory government agency located in Gaithersburg, Md.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (CSF) provides guidance on how to manage and reduce IT infrastructure security risk.
  • no op (no operation) - No op means 'no operation,' which is a computer instruction that specifies no operation but takes up a small amount of storage space.
  • no-code - No-code is a software development approach that requires few, if any, programming skills to quickly build an application, website or module that links into an existing system.
  • no-fly zone - A no-fly zone is a restricted area of airspace over a landmark, event or geographic region in which aircraft are forbidden to fly, unless they have special authorization.
  • Node.js (Node) - Node.js (Node) is an open source, cross-platform runtime environment for executing JavaScript code.
  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy data - Noisy data is a data set that contains extra meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase that describes a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources which can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-fungible token (NFT) - A non-fungible token (NFT) is a unique cryptographic asset used to create and authenticate ownership of digital assets.
  • non-interlaced display - A non-interlaced display is a screen display in which the lines are scanned progressively from the top to the bottom of the screen.
  • non-uniform memory access (NUMA) - Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonprofit organization (NPO) - A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B-spline (NURBS) - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • NoOps (no operations) - NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • normal distribution - A normal distribution is a type of continuous probability distribution in which most data points cluster toward the middle of the range, while the rest taper off symmetrically toward either extreme.
  • North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) - The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is a set of standards aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America.
  • northbound interface/southbound interface - A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a higher-level or more central component, while -- conversely -- a southbound interface allows a higher-level component to send commands to lower-level network components.
  • NoSQL (Not Only SQL database) - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • not for resale (NFR) - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products to the end user.
  • not invented here (NIH) syndrome - Not invented here (NIH) syndrome is the name of the tendency for management to resist change by overlooking processes or solutions discovered outside of the company.
  • notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces, such as airplanes, libraries, temporary offices and meetings.
  • NRZ (non-return-to-zero) - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • nslookup - Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record.
  • NTFS (NT File System) - NTFS, which stands for 'NT file system' and the 'New Technology File System,' is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).
  • null set - In mathematical sets, a null set is a set that does not contain any values or elements.
  • Nutanix - Nutanix is a hyper-converged infrastructure pioneer that markets its technology as a building block for private clouds.
  • NVDIMM (Non-Volatile Dual In-line Memory Module) - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
  • NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
  • Nvidia - Nvidia Corporation is a technology company known for designing and manufacturing graphics processing units (GPUs).
  • Nvidia Omniverse - Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial computing and physics-based workflows across Nvidia tools, third-party apps and AI services.
  • NVMe (non-volatile memory express) - NVMe (non-volatile memory express) is a transfer protocol created to accelerate the transfer speed of data in solid-state storage devices.
  • NVMe over Fabrics (NVMe-oF) - NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to connect hosts to storage across a network fabric using the NVMe network protocol.
  • NVMe over Fibre Channel (NVMe over FC) or FC-NVMe standard - Nonvolatile memory express over Fibre Channel (NVMe over FC) -- which is implemented through the Fibre Channel-NVMe (FC-NVMe) standard -- is a technology specification designed to enable NVMe-based message commands to transfer data and status information between a host computer and a target storage subsystem over a Fibre Channel network fabric.
  • NVRAM (non-volatile random access memory) - NVRAM (non-volatile random access memory) refers to computer memory that can hold data even when power to the memory chips has been turned off.
  • Nyquist theorem - The Nyquist theorem is also known as the sampling theorem.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • What is NetOps? Everything you need to know - NetOps, also referred to as NetOps 2.
  • What is network virtualization? Everything you need to know - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
Networking
  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

  • What is SD-WAN (software-defined WAN)? Ultimate guide

    Software-defined WAN is a technology that uses software-defined networking concepts to distribute network traffic across a wide ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close