Browse Definitions :
Definition

access provider

An access provider is any organization that arranges for an individual or an organization to have access to the Internet. Access providers are generally divided into two classes: Internet access providers (ISPs) and online service providers (OSPs). ISPs can be local businesses that pay for a high-speed connection to one of the companies (such as AT&T, Sprint, or MCI in the U.S.) that are part of the Internet. They can also be national or international companies that have their own networks (such as AT&T's WorldNet or IBM's Global Services). OSPs, sometimes just called "online services," also have their own networks but provide additional information services not available to non-subscribers. America Online is the most successful example of an OSP.

A typical charge from an access provider for an individual account is $10 - 30 U.S. a month, depending on the amount of usage you contract for. Hours of use beyond the arranged number are billed as an extra charge at an hourly rate. Both national and local access providers compete for business in national and local publications.

Microsoft's Windows systems offer personal computer users access to the Microsoft Internet service as well as to America Online, IBM, and several other services.

An access provider may have its own point-of-presence (POP) on the Internet, or it may be a company that has a telecommunication connection to someone else with a POP.

An access provider is not the same as a "space provider" (virtual host), a company that provides space and management for individual or business Web sites. However, some access providers do provide a certain amount of space for a Web site as part of their service.

This was last updated in September 2005

Continue Reading About access provider

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close