Browse Definitions :
Definition

W3C (World Wide Web Consortium)

The World Wide Web Consortium (W3C) describes itself as follows:

"The World Wide Web Consortium exists to realize the full potential of the Web.

The W3C is an industry consortium which seeks to promote standards for the evolution ofthe Web and interoperability between WWW products by producing specifications andreference software. Although W3C is funded by industrial members, it is vendor-neutral,and its products are freely available to all.

The Consortium is international; jointly hosted by the MIT Laboratory for Computer Science in theUnited States and in Europe by INRIA who provide both local support and performing coredevelopment. The W3C was initially established in collaboration with CERN, where the Web originated,and with support from DARPA and the European Commission."

Organizations may apply for membership to the Consortium; individual membership isn't offered. The W3C has taken over what was formerly called the CERN Hypertext Transfer Protocol daemon or Web server.

This was last updated in March 2007

Continue Reading About W3C (World Wide Web Consortium)

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

From a Compliance perspective, once a draft document is approved, is it necessary to maintain the minor (unapproved) versions of the document, if yes what is the value?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchSecurity

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also known as public-key cryptography, is a process that uses a pair of related keys -- one public key ...

  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from its victims' bank accounts.

  • Plundervolt

    Plundervolt is a method of hacking that involves depriving an Intel chip of power so that processing errors occur.

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • 3D NAND flash

    3D NAND is a type of non-volatile flash memory in which the memory cells are stacked vertically in multiple layers.

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

Close