Browse Definitions:

Consumer Technology

Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

Desktop PCs

Terms related to PCs, including definitions about desktop computers and words and phrases about computer components.

  • principle of least privilege (POLP)

    The principle of least privilege (POLP), an important concept in computer security, is the practice of limiting access rights for users to the bare minimum permissions they need to perform their work.

  • channel partner

    A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor. Value-added resellers (VARs), systems integrators (SIs), consultants, managed service providers (MSPs), original equipment manufacturers (OEMs), distributors and independent software vendors (ISVs) may all be called channel partners.

  • phase-change memory (PCM)

    Phase-change memory (PCM) is a form of computer RAM (random-access memory) that stores data by altering the state of the matter from which the device is fabricated.

View All Desktop PCs Definitions

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

  • technology addiction (internet addiction)

    Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology. The disorder may also be referred to as digital addiction or internet addiction.

  • white hat

    A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.

  • sock puppet marketing

    Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service. The false identity is known as a sock puppet.

View All Internet acronyms and lingo Definitions Back to Top

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

  • VoIP phone

    A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.

  • API management

    API management is the process of overseeing application programming interfaces (APIs) in a secure, scalable environment.

  • Ripple

    Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.

View All Internet technologies Definitions Back to Top

Multimedia and graphics

Terms related to multimedia, including graphics, animation and video definitions and words and phrases about images and sound.

  • CMOS sensor

    A CMOS sensor is an electronic chip that converts photons to electrons.

  • voice recognition (speaker recognition)

    Voice or speaker recognition is the ability of a machine or program to receive and interpret dictation or to understand and carry out spoken commands.

  • drone glasses (drone goggles)

    Drone glasses are eyewear that gives someone flying an unmanned aerial vehicle (UAV) a first-person view of where the drone flies.

View All Multimedia and graphics Definitions Back to Top

Peripherals

Terms related to peripheral devices including definitions about keyboards or mice and words and phrases about printers, monitors, digital cameras and scanners.

  • heat bed

    A heat bed is an additional module for a 3D printer that makes the cooling process of 3D printed materials more controlled, for better results.

  • channel partner

    A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor. Value-added resellers (VARs), systems integrators (SIs), consultants, managed service providers (MSPs), original equipment manufacturers (OEMs), distributors and independent software vendors (ISVs) may all be called channel partners.

  • NOR flash memory

    NOR flash memory is one of two types of nonvolatile storage technologies.

View All Peripherals Definitions Back to Top

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

  • mobile enterprise application platform (MEAP)

    A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.

  • technology addiction (internet addiction)

    Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology. The disorder may also be referred to as digital addiction or internet addiction.

  • filter bubble

    A filter bubble is an algorithmic bias that skews or limits the information an individual user sees on the internet. The bias is caused by the weighted algorithms that search engines, social media sites and marketers use to personalize user experience (UX).

View All Personal computing Definitions Back to Top

Printers

Terms related to printers, including definitions about scanners and words and phrases about inkjet, laser, photo and all-in-one printers.

  • rafts, skirts and brims

    Rafts, skirts and brims are structures created at the base of the bottom of a 3D print. These structures are temporary and used to improve print reliability and quality.

  • print bed

    A print bed is the surface on a 3D printer where a print head lays down the materials that make up a 3D print.

  • heat bed

    A heat bed is an additional module for a 3D printer that makes the cooling process of 3D printed materials more controlled, for better results.

View All Printers Definitions Back to Top

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

  • VoIP phone

    A VoIP phone is a hardware- or software-based telephone designed to use voice over IP (VoIP) technology to send and receive phone calls over an IP network.

  • mobile enterprise application platform (MEAP)

    A mobile enterprise application platform (MEAP) is a development environment that provides tools and middleware to develop, test, deploy and manage corporate software running on mobile devices.

  • mobile application management (MAM)

    Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.

View All Wireless and mobile Definitions Back to Top

-ADS BY GOOGLE

SearchCompliance

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces.

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

  • pure risk (absolute risk)

    Pure risk, also called absolute risk, is a category of threat that is beyond human control and has only one possible outcome if ...

SearchSecurity

  • FIDO (Fast Identity Online)

    FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. FIDO is developed by the...

  • cryptanalysis

    Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and ...

  • Trojan horse (computing)

    In computing, a Trojan horse is a program that appears harmless, but is, in fact, malicious.

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

SearchStorage

  • cloud storage provider

    A cloud storage provider, also known as a managed service provider (MSP), is a company that offers organizations and individuals ...

  • personal cloud storage (PCS)

    Personal cloud storage (PCS) enables users to store data, photos, music, videos and other files on a local network-attached ...

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close