Short for near-end crosstalk (the “X” standing for “cross”), the measurement of crosstalk between two twisted-pair wires. Current flowing through wires creates electromagnetic fields that can interfere with signals on adjacent wires. NEXT occurs when a strong signal from one pair of wires is picked up by an adjacent pair. NEXT is the measurement of the portion of the signal that is electromagnetically coupled back into the received signal.
- NFC Forum
The Near Field Communication (NFC) Forum is a non-profit industry association formed to advance the use of NFC short-range wireless interaction in consumer electronics, mobile devices and PCs. The NFC Forum promotes implementation and standardization of NFC technology to ensure interoperability between devices and services.
Abbreviation of Network File System, a client/server application designed by Sun Microsystems that allows all network users to access shared files stored on computers of different types. NFS provides access to shared files through an interface called the Virtual File System (VFS) that runs on top of TCP/IP. Users can manipulate shared files as if […]
- NGI Initiative
Short for Next Generation Internet Initiative, a U.S. program designed to fund and coordinate federal agencies and academia to design and build the next generation of Internet services. The program was first proposed by President Clinton in 1996 and has not yet been formally specified or funded by Congress. It is still unclear how the […]
Short for next-generation microarchitecture (Codenamed Conroe, Merom, and Woodcrest for desktop, notebook and server versions, respectively) NGMA is a new CPU from Intel that will be dual-core designs that represent a hybrid of the NetBurst and Pentium M architectures.
- Intrusion Detection System
An intrusion detection system (IDS) inspects all inbound and outbound network activity and identifies suspicious patterns that may indicate a network or system attack from someone attempting to break into or compromise a system. There are several ways to categorize an IDS: misuse detection vs. anomaly detection: in misuse detection, the IDS analyzes the information […]