Browse Definitions :
Definition

access provider

An access provider is any organization that arranges for an individual or an organization to have access to the Internet. Access providers are generally divided into two classes: Internet access providers (ISPs) and online service providers (OSPs). ISPs can be local businesses that pay for a high-speed connection to one of the companies (such as AT&T, Sprint, or MCI in the U.S.) that are part of the Internet. They can also be national or international companies that have their own networks (such as AT&T's WorldNet or IBM's Global Services). OSPs, sometimes just called "online services," also have their own networks but provide additional information services not available to non-subscribers. America Online is the most successful example of an OSP.

A typical charge from an access provider for an individual account is $10 - 30 U.S. a month, depending on the amount of usage you contract for. Hours of use beyond the arranged number are billed as an extra charge at an hourly rate. Both national and local access providers compete for business in national and local publications.

Microsoft's Windows systems offer personal computer users access to the Microsoft Internet service as well as to America Online, IBM, and several other services.

An access provider may have its own point-of-presence (POP) on the Internet, or it may be a company that has a telecommunication connection to someone else with a POP.

An access provider is not the same as a "space provider" (virtual host), a company that provides space and management for individual or business Web sites. However, some access providers do provide a certain amount of space for a Web site as part of their service.

This was last updated in September 2005

Continue Reading About access provider

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, ...

  • PKI (public key infrastructure)

    PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange ...

  • obfuscation

    Obfuscation means to make something difficult to understand.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close