Browse Definitions:
Definition

URN (Uniform Resource Name)

A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource. A frequent problem in using the Web is that Web content is sometimes moved to a new site or a new page on the same site. Since links are made using Uniform Resource Locators (URLs), they no longer work when content is moved.

A URN looks something like a URL. For example, here's a hypothetical URN:

 urn:def://blue_laser

where "def://" might indicate an agency or an accessible directory of all dictionaries, glossaries, and encyclopedias on the Internet and "blue laser" was the name of a term. The result of using the agency could be the "best definition," the "longest definition," or even all definitions that the agency could find of "blue laser."

A comparable URL would need to specify one specific location for a definition such as:

 https://whatis.techtarget.com/definition/blue-laser

In this case, the user has to know where the resource is located as well as how to spell the file name and suffix. With a URN, the user only needs to know the name of a resource. One or more agencies will presumably be able to locate the nearest copy of the resource and the user is freed from understanding where resources are located or relocated to.

Both URN and URL are types of a concept called the Uniform Resource Identifier (URI). A URN is associated with another concept called Uniform Resource Characteristics (URC), which allows descriptive information to be associated with a URN, such as author, date, length, and so forth.

It is possible to have a name that includes an address so, in some cases, a URN may also be a URL...but it doesn't have to be.

The URN is still being developed by members of the Internet Engineering Task Force (IETF).

This was last updated in September 2005

Continue Reading About URN (Uniform Resource Name)

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Does Adobe Acrobat allow for the use of URNs?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil ...

  • Common Body of Knowledge (CBK)

    In security, Common Body of Knowledge (CBK) is a comprehensive framework of all the relevant subjects a security professional ...

  • rootkit

    A rootkit is a program or, more often, a collection of software tools that gives a threat actor remote access to and control over...

SearchHealthIT

  • value-based healthcare

    Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing ...

  • health informatics

    Health informatics is the practice of acquiring, studying and managing health data and applying medical concepts in conjunction ...

  • clinical trial

    A clinical trial, also known as a clinical research study, is a protocol to evaluate the effects and efficacy of experimental ...

SearchDisasterRecovery

  • crisis communication

    Crisis communication is a method of corresponding with people and organizations during a disruptive event to provide them with ...

  • Zerto

    Zerto is a storage software vendor that specializes in enterprise-class business continuity and disaster recovery in virtual and ...

  • crisis management plan (CMP)

    A crisis management plan (CMP) is a document that outlines the processes an organization will use to respond to a critical ...

SearchStorage

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • Red Hat OpenStack Platform

    Red Hat OpenStack Platform is a commercially supported distribution of open source OpenStack software designed to build and ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close