Reference

Learning Path: Internet Ideas and Issues

Part of the Internet technologies glossary:

IDEAS AND ISSUES...paradigm - meme - fuzzy logic - copyleft - open source - foxed - granularity - interoperability - scalability - convergence - hacker - cracker - human-computer interaction - ergonomic - white paper - seamless interface - Ockham's razor - business intelligence (BI) - Information Society - software piracy - millennium

View other topics for self-study by visiting our Guide to the Learning Paths.

This was last updated in May 2008
Posted by: Margaret Rouse

Related Terms

Definitions

  • server

    - In information technology, a server is a computer program that provides services to other computer programs (and their users) in the same or other computers. (WhatIs.com)

  • Vint Cerf (Vinton Gray Cerf)

    - Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer. With engineer Bob Kahn, Cerf developed the TCP/IP protocol suite and the architecture that enabled... (WhatIs.com)

  • SYN flood (half open attack)

    - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server. (SearchSecurity.com)

Glossaries

  • Internet technologies

    - This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

  • Internet applications

    - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Ask a Question. Find an Answer.Powered by ITKnowledgeExchange.com

Ask An IT Question

Get answers from your peers on your most technical challenges

Ask Question
  • Router Shows in My Network

    It's got nothing to do with the router. I assume that you are using the router as your DHCP server? I also assume that the router is using your ISPs DNS servers as the DNS servers to give you all...

  • Safe user sandbox?

    Simple: there is no such thing as an invulnerable system. I wish there were one too. See the 10 Immutable Rules of Security, especially the following: Rule #3: If a bad guy has unrestricted physic...

Tech TalkComment

Share
Comments

    Results

    Contribute to the conversation

    All fields are required. Comments will appear at the bottom of the article.