Browse Definitions :
Definition

Webify

Contributor(s): Bob Brodie

Also see Webification.

1) To Webify is to convert some information content from its original format into a format capable of being displayed on the World Wide Web. Some conversion examples are:

  • A Postscript source file or ASCII text to a Hypertext Markup Language (HTML) file
  • A Microsoft Word document to HTML (sometimes referred to as "DOC to HTML"). More recent versions of Microsoft Word include this capability.
  • Hard-copy print publication pages into files in the Portable Document Format (PDF) for viewing on the Web with Adobe's downloadable Acrobat viewer
  • A Lotus Notes database to HTML files
  • An image in a scanned-in or other format to a Web-ready image, either a GIF or a JPEG file
  • A speech or interview into a file in the RealAudio format for playing as streaming sound on the Web
  • A video tape recording into a streaming video file

Using the File Transfer Protocol (FTP) from the Web browser, text pages (with files in the ASCII TXT format) can also be "Webified" for display by Web users. Many Internet Request for Comment (Request for Comments) documents are available on the Web in the text format. The only Webification these files need is to simply make them available in a directory accessible to the FTP server.

2) Webify is the name of a program that makes a structured tree of HTML files and JPEG or GIF images from Postscript files.

This was last updated in April 2005

Continue Reading About Webify

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close