Browse Definitions :

Browse Definitions by Alphabet

NOI - WHA

  • noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
  • noisy channel model - The noisy channel model is a framework used in natural language processing (NLP) to identify the correct word in situations where it is unclear.
  • noisy data - Noisy data is meaningless data.
  • noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users' cloud performance.
  • noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
  • nomadicity - Nomadicity is the tendency of a person, or group of people, to move with relative frequency.
  • nomophobia - Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal, a low battery or running out of minutes.
  • non-compete agreement (NCA) - A non-compete agreement (NCA) is a legally binding restrictive covenant designed to prevent the signee from exploiting competitive advantages gained through association with the other party in the agreement.
  • non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
  • non-disruptive data migration - Non-disruptive data migration is a feature that allows data movement from one storage device to another without causing downtime in the environment.
  • non-disruptive upgrade (NDU) - A non-disruptive upgrade (NDU) is an update to software or hardware done without interruption to system service or data access.
  • non-geographic number - A non-geographic number, also called a virtual number, is a telephone number associated with a country, but not to any single geographic location within that country.
  • non-interlaced display - A non-interlaced display is a cathode-ray tube (CRT) display in which the lines are scanned sequentially from the top to the bottom of the screen.
  • non-practicing entity (NPE) - A non-practicing entity (NPE) is someone who holds a patent for a product or process but has no intentions of developing it.
  • non-renewable resource - A non-renewable resource is one that either does not regenerate or does not regenerate quickly enough to serve some human purpose in a sustainable way.
  • non-uniform memory access (NUMA) - Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally.
  • non-volatile memory (NVM) - Non-volatile memory (NVMe) is a semiconductor technology that does not require a continuous power supply to retain the data or program code stored in a computing device.
  • non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
  • nonfungible token (NFT) - A nonfungible token (NFT) is a type of cryptographic asset that is unique and used to create and authenticate ownership of digital assets.
  • nonlinearity - Nonlinearity is the behavior of a circuit, particularly an amplifier, in which the output signal strength does not vary in direct proportion to the input signal strength.
  • nonprofit organization (NPO) - A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
  • nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
  • nonuniform rational B-spline (NURBS) - NURBS (nonuniform rational B-splines) are mathematical representations of 2- or 3-dimensional objects, which can be standard shapes (such as a cone) or free-form shapes (such as a car).
  • NoOps - NoOps (no operations) is the concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there is no need for a dedicated team to manage software in-house.
  • NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
  • norm - A norm (from norma, Latin for carpenter's square) is a model of what should exist or be followed, or an average of what currently does exist in some context, such as an average salary among members of a large group.
  • normal distribution - A normal distribution is an arrangement of a data set in which most values cluster in the middle of the range and the rest taper off symmetrically toward either end.
  • normative - In general, normative - pertaining to a norm - has two related meanings: (a prescriptive meaning (for example, the rules specified in a standard or guideline), and (2) a descriptive meaning (for example, the median salary range in an particular occupation).
  • North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) - The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is a set of standards aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America.
  • northbound interface/southbound interface - A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a higher-level or more central component, while -- conversely -- a southbound interface allows a higher-level component to send commands to lower-level network components.
  • Northbridge - Northbridge is an Intel chipset that communicates with the computer processor and controls interaction with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities.
  • NoSQL (Not Only SQL database) - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
  • not for resale (NFR) - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products to the end user.
  • not invented here (NIH) syndrome - Not invented here (NIH) syndrome is the name of the tendency for management to resist change by overlooking processes or solutions discovered outside of the company.
  • notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings.
  • NRZ (non-return-to-zero) - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
  • nslookup - nslookup is the name of a program that lets an Internet server administrator or any computer user enter a host name (for example, "whatis.
  • Ntdsutil - Ntdsutil.exe is a command-line tool for accessing and managing a Windows Active Directory database.
  • NTFS (NT File System) - NTFS, which stands for 'NT file system' and the 'New Technology File System,' is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).
  • nuclear fusion - Nuclear fusion is an atomic reaction in which multiple atoms combine to create a single, more massive atom.
  • null set - In mathematical sets, the null set, also called the empty set, is the set that does not contain anything.
  • number theory (higher arithmetic) - Number theory, also known as higher arithmetic, is a branch of mathematics concerned with the properties of integer s, rational number s, irrational number s, and real number s.
  • NUnit - NUnit is an evolving, open source framework designed for writing and running tests in Microsoft .
  • Nutanix - Nutanix is a hyper-converged infrastructure pioneer that markets its technology as a building block for private clouds.
  • Nutanix Acropolis - Acropolis is a free server virtualization hypervisor developed by vendor Nutanix that is packaged on hyper-converged appliances, and can be used alongside competing hypervisors.
  • Nutanix Prism - Users manage Nutanix hyper-converged infrastructure technology through Prism -- software that provides management of clusters, virtual machines and networking through a single interface.
  • NVDIMM (Non-Volatile Dual In-line Memory Module) - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
  • NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
  • Nvidia - Nvidia Corporation is a technology company known for designing and manufacturing graphics processing units (GPUs).
  • NVMe (non-volatile memory express) - NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer speed of data between enterprise and client systems and SSDs over a computer's high-speed PCIe bus.
  • NVMe over Fabrics (NVMe-oF) - NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to connect hosts to storage across a network fabric using the NVMe protocol.
  • NVMe over Fibre Channel (NVMe over FC) or FC-NVMe standard - Nonvolatile memory express over Fibre Channel (NVMe over FC) -- which is implemented through the Fibre Channel-NVMe (FC-NVMe) standard -- is a technology specification designed to enable NVMe-based message commands to transfer data and status information between a host computer and a target storage subsystem over a Fibre Channel network fabric.
  • NVRAM (non-volatile random-access memory) - NVRAM (non-volatile random-access memory) refers to computer memory that can hold data even when power to the memory chips has been turned off.
  • nym - A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity.
  • Nyquist theorem - The Nyquist theorem is also known as the sampling theorem.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • What is a neural network? Explanation and examples - In information technology, an artificial neural network is a system of hardware and/or software patterned after the operation of neurons in the human brain.
  • What is NetOps? Everything you need to know - NetOps, also referred to as NetOps 2.
  • What is network virtualization? Everything you need to know - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.
SearchNetworking
  • Wi-Fi 6E

    Wi-Fi 6E is one variant of the 802.11ax standard.

  • microsegmentation

    Microsegmentation is a security technique that splits a network into definable zones and uses policies to dictate how data and ...

  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close