Browse Definitions :

Browse Definitions by Alphabet

  • neural network - A neural network is a machine learning (ML) model designed to mimic the function and structure of the human brain.
  • neural radiance field (NeRF) - Neural radiance fields (NeRF) are a technique that generates 3D representations of an object or scene from 2D images by using advanced machine learning.
  • neuro-symbolic AI - Neuro-symbolic AI combines neural networks with rules-based symbolic processing techniques to improve artificial intelligence systems' accuracy, explainability and precision.
  • neurofeedback - Neurofeedback is a therapeutic method based on presenting to clients a real-time display of their brain activity and training them, over time, to learn to control that activity.
  • neuromarketing - Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically monitoring brainwave activity, eye tracking and skin response.
  • neuromorphic computing - Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.
  • neurosynaptic chip - A neurosynaptic chip, also known as a cognitive chip, is a computer processor that is designed to function more like a biological brain than a typical central processing unit (CPU).
  • neutron - A neutron is a subatomic particle found in the nucleus of every atom except that of simple hydrogen.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • newsgroup - A newsgroup is an online discussion forum where users can post messages, exchange ideas and read the comments of others.
  • newton-second - The newton-second is the standard unit of impulse.
  • Next Hop Resolution Protocol (NHRP) - Next Hop Resolution Protocol (NHRP) is an automated configuration technology that routes data on a distributed network by discovering the best routing path between endpoints.
  • next-generation firewall (NGFW) - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.
  • Nexus - Nexus is a series of smartphones and tablets manufactured by Google and its hardware partners.
  • NFV MANO (network functions virtualization management and orchestration) - NFV MANO (network functions virtualization management and orchestration), also called MANO, is an architectural framework for managing and orchestrating virtualized network functions (VNFs) and other software components.
  • NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
  • Nginx - Nginx (pronounced engine x) is open source webserver software that also performs reverse proxy, load balancing, email proxy and HTTP cache services.
  • nibble - In computing and digital technology, a nibble is four consecutive binary digits or half of an 8-bit byte.
  • NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) - The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
  • nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
  • Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
  • NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
  • NIST (National Institute of Standards and Technology) - NIST (National Institute of Standards and Technology) is a nonregulatory government agency located in Gaithersburg, Md.
  • NIST Cybersecurity Framework - The NIST Cybersecurity Framework (CSF) provides guidance on how to manage and reduce IT infrastructure security risk.
  • no op (no operation) - No op means 'no operation,' which is a computer instruction that specifies no operation but takes up a small amount of storage space.
  • no-code - No-code is a software development approach that requires few, if any, programming skills to quickly build an application, website or module that links into an existing system.
  • no-fly zone - A no-fly zone is a restricted area of airspace over a landmark, event or geographic region in which aircraft are forbidden to fly, unless they have special authorization.
  • Node.js (Node) - Node.js (Node) is an open source, cross-platform runtime environment for executing JavaScript code.
  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy data - Noisy data is a data set that contains extra meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase that describes a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources which can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-fungible token (NFT) - A non-fungible token (NFT) is a unique cryptographic asset used to create and authenticate ownership of digital assets.
  • non-interlaced display - A non-interlaced display is a screen display in which the lines are scanned progressively from the top to the bottom of the screen.
  • non-uniform memory access (NUMA) - Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile memory express over Fibre Channel (NVMe over FC) - Non-volatile memory express over Fibre Channel (NVMe over FC) is a technology specification designed to enable NVMe-based message commands to transfer data and status information between a host computer and a target storage subsystem over a Fibre Channel network fabric.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonprofit organization (NPO) - A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B-spline (NURBS) - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • NoOps (no operations) - NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • normal distribution - A normal distribution is a type of continuous probability distribution in which most data points cluster toward the middle of the range, while the rest taper off symmetrically toward either extreme.
  • North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) - The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is a set of standards aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America.
  • northbound interface/southbound interface - A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a higher-level or more central component, while -- conversely -- a southbound interface allows a higher-level component to send commands to lower-level network components.
  • NoSQL (Not Only SQL database) - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • not for resale (NFR) - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products to the end user.
  • not invented here (NIH) syndrome - Not invented here (NIH) syndrome is the name of the tendency for management to resist change by overlooking processes or solutions discovered outside of the company.
  • notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces, such as airplanes, libraries, temporary offices and meetings.
  • NRZ (non-return-to-zero) - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • nslookup - Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record.
  • NTFS (NT File System) - NTFS, which stands for 'NT file system' and the 'New Technology File System,' is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).
  • null set - In mathematical sets, a null set is a set that does not contain any values or elements.
  • Nutanix - Nutanix is a private and hybrid cloud software provider.
  • NVDIMM (Non-Volatile Dual In-line Memory Module) - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
  • NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
  • Nvidia - Nvidia Corporation is a technology company known for designing and manufacturing graphics processing units (GPUs).
  • Nvidia Omniverse - Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial computing and physics-based workflows across Nvidia tools, third-party apps and AI services.
  • NVMe (non-volatile memory express) - NVMe (non-volatile memory express) is a transfer protocol created to accelerate the transfer speed of data in solid-state storage devices.
  • NVMe over Fabrics (NVMe-oF) - NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to connect hosts to storage across a network fabric using the NVMe network protocol.
  • NVRAM (non-volatile random access memory) - NVRAM (non-volatile random access memory) refers to computer memory that can hold data even when power to the memory chips has been turned off.
  • Nyquist theorem - The Nyquist theorem is also known as the sampling theorem.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • What is NetOps? Everything you need to know - NetOps, also referred to as NetOps 2.
  • What is network virtualization? Everything you need to know - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close