Browse Definitions :
Definition

buddy list

In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of. A buddy list can be used to see who is offline, who is online, who is online but away from their computer, who has their phone turned off, who has their phone turned on, or who is currently talking on their phone.

When the user launches their instant messaging application, it connects to the instant messaging server, logs the user on, and displays the screen names of people the user has put on their buddy list. The server checks the user's buddy list and visually lets the user know which buddies are available for messaging. At the same time, the server updates the buddy lists of the user's buddies to indicate that the user is currently available for messaging.

With some instant messaging applications, it's possible to store a message on the instant messaging server temporarily if a buddy is unavailable, so that when the buddy does become available, the message will be sent.

This was last updated in September 2005

Continue Reading About buddy list

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • whaling attack (whaling phishing)

    A whaling attack, also known as whaling phishing or a whaling phishing attack, is a specific type of phishing attack that targets...

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

Close