Browse Definitions by Alphabet
- NFVi (network functions virtualization infrastructure) - NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support and connect virtual network functions in carrier networks.
- nibble - In computing and digital technology, a nibble is four consecutive binary digits or half of an 8-bit byte.
- NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) - The NICE Framework (National Initiative for Cybersecurity Education Cybersecurity Workforce Framework) is a reference resource that classifies the typical skill requirements and duties of cybersecurity workers.
- nil - In general use, nil (a contraction of Latin "nihil") means "nothing" or the absence of something.
- Nimda - First appearing on September 18, 2001, Nimda is a computer virus that caused traffic slowdowns as it rippled across the internet.
- NIS (Network Information System) - NIS (Network Information System) is a network naming and administration system for smaller networks that was developed by Sun Microsystems.
- NIST (National Institute of Standards and Technology) - NIST (National Institute of Standards and Technology) is a nonregulatory government agency located in Gaithersburg, Md.
- NIST Cybersecurity Framework - The NIST Cybersecurity Framework (CSF) provides guidance on how to manage and reduce IT infrastructure security risk.
- no op (no operation) - No op means 'no operation,' which is a computer instruction that specifies no operation but takes up a small amount of storage space.
- Node.js (Node) - Node.js (Node) is an open source, cross-platform runtime environment for executing JavaScript code.
- noise - Noise is unwanted electrical or electromagnetic energy that degrades the quality of signals and data.
- noisy data - Noisy data is a data set that contains extra meaningless data.
- noisy neighbor (cloud computing performance) - Noisy neighbor is a phrase that describes a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources which can negatively affect other users' cloud performance.
- noisy text - Noisy text is an electronically-stored communication that cannot be categorized properly by a text mining software program.
- non-disclosure agreement (NDA) - A non-disclosure agreement (NDA), also known as a confidentiality agreement (CA), is a signed legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time.
- non-fungible token (NFT) - A non-fungible token (NFT) is a unique cryptographic asset used to create and authenticate ownership of digital assets.
- non-interlaced display - A non-interlaced display is a screen display in which the lines are scanned progressively from the top to the bottom of the screen.
- non-uniform memory access (NUMA) - Non-uniform memory access, or NUMA, is a method of configuring a cluster of microprocessors in a multiprocessing system so they can share memory locally.
- non-volatile memory (NVM) - Non-volatile memory (NVM) is a type of computer storage medium that retains data even in the absence of a power supply.
- non-volatile storage (NVS) - Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to retain data or program code persistently on a short- or long-term basis.
- nonprofit organization (NPO) - A nonprofit organization (NPO) is one that is not driven by profit but by dedication to a given cause that is the target of all income beyond what it takes to run the organization.
- nonrepudiation - Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information.
- NoOps (no operations) - NoOps (no operations) is a concept that an IT environment can become so automated and abstracted from the underlying infrastructure that there's no need for a dedicated team to manage software in-house.
- NOR flash memory - NOR flash memory is one of two types of non-volatile storage technologies.
- normal distribution - A normal distribution is a type of continuous probability distribution in which most data points cluster toward the middle of the range, while the rest taper off symmetrically toward either extreme.
- North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) - The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) plan is a set of standards aimed at regulating, enforcing, monitoring and managing the security of the Bulk Electric System (BES) in North America.
- northbound interface/southbound interface - A northbound interface is an application programming interface (API) or protocol that allows a lower-level network component to communicate with a higher-level or more central component, while -- conversely -- a southbound interface allows a higher-level component to send commands to lower-level network components.
- not for resale (NFR) - Not for resale (NFR) is a designation for products that vendors give to their channel partners for testing and educational purposes with the understanding that the channel partner will not resell those products to the end user.
- notebook computer - A notebook computer is a battery- or AC-powered personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces, such as airplanes, libraries, temporary offices and meetings.
- NRZ (non-return-to-zero) - NRZ (non-return-to-zero) refers to a form of digital data transmission in which the binary low and high states, represented by numerals 0 and 1, are transmitted by specific and constant DC (direct-current) voltage s.
- nslookup - Nslookup is the name of a program that lets users enter a host name and find out the corresponding IP address or domain name system (DNS) record.
- NTFS (NT File System) - NTFS, which stands for 'NT file system' and the 'New Technology File System,' is the file system that the Windows NT operating system (OS) uses for storing and retrieving files on hard disk drives (HDDs) and solid-state drives (SSDs).
- null set - In mathematical sets, a null set is a set that does not contain any values or elements.
- Nutanix - Nutanix is a private and hybrid cloud software provider.
- NVGRE (Network Virtualization using Generic Routing Encapsulation) - NVGRE (Network Virtualization using Generic Routing Encapsulation) is a network virtualization method that uses encapsulation to create large numbers of virtual LANs (VLANs) for subnets that can extend across dispersed data centers and Layers 2 and 3.
- Nvidia - Nvidia Corporation is a technology company known for designing and manufacturing graphics processing units (GPUs).
- Nvidia Omniverse - Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial computing and physics-based workflows across Nvidia tools, third-party apps and AI services.
- NVMe (non-volatile memory express) - NVMe (non-volatile memory express) is a transfer protocol created to accelerate the transfer speed of data in solid-state storage devices.
- NVMe over Fabrics (NVMe-oF) - NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to connect hosts to storage across a network fabric using the NVMe network protocol.
- NVRAM (non-volatile random access memory) - NVRAM (non-volatile random access memory) refers to computer memory that can hold data even when power to the memory chips has been turned off.
- Nyquist theorem - The Nyquist theorem is also known as the sampling theorem.
- SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
- What is a neural network? - A neural network is a machine learning (ML) model designed to process data in a way that mimics the function and structure of the human brain.
- What is a next-generation firewall (NGFW)? - A next-generation firewall (NGFW) is part of the third generation of firewall technology that can be implemented in hardware or software.
- What is an NVDIMM (non-volatile dual in-line memory module)? - An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.
- What is named entity recognition (NER)? - Named entity recognition (NER) is a natural language processing (NLP) method that extracts information from text.
- What is narrow AI (weak AI)? - Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates -- and perhaps surpasses -- human intelligence for a dedicated purpose.
- What is National Electrical Code (NEC)? - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the Americas.
- What is natural language generation (NLG)? - Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set.
- What is natural language processing (NLP)? - Natural language processing (NLP) is the ability of a computer program to understand human language as it’s spoken and written -- referred to as natural language.
- What is natural language understanding (NLU)? - Natural language understanding (NLU) is a branch of artificial intelligence (AI) that uses computer software to understand input in the form of sentences using text or speech.
- What is nearbound marketing? - Nearbound marketing is a strategy that capitalizes on partnerships, networks and trusted connections to generate demand from higher-quality leads.
- What is NetApp? - NetApp, formerly Network Appliance, Inc.
- What is NetOps? Everything you need to know - NetOps, also referred to as NetOps 2.
- What is network scanning? How to, types and best practices - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal to devices and await a response.
- What is network virtualization? Everything you need to know - Network virtualization is a method of combining the available resources in a network to consolidate multiple physical networks, divide a network into segments or create software networks between VMs.
- What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
- What is no-code? Everything you need to know - No-code is a software development approach that requires few, if any, programming skills to quickly build an application, website or module that links into an existing system.
- What is NoSQL (Not Only SQL database)? - NoSQL is an approach to database management that can accommodate a wide variety of data models, including key-value, document, columnar and graph formats.
- What is NumPy? Explaining how it works in Python - NumPy is an open source mathematical and scientific computing library for Python programming tasks.
- What is NVMe over Fibre Channel (NVMe over FC)? Definition and Guide - Non-volatile memory express over Fibre Channel (NVMe over FC) is a technology specification designed to enable NVMe-based message commands to transfer data and status information between a host computer and a target storage subsystem over a Fibre Channel network fabric.