Browse Definitions :
Definition

online mapping

Online mapping is the compilation and publication of Web sites that provide exhaustive graphical and text information in the form of maps and databases. Online mapping services are used for tasks such as planning trips, determining geographical positions, finding landmarks and businesses, obtaining addresses and phone numbers, and plotting storm tracks.

The first well-known online mapping service was MapQuest. It was launched in 1996 and is still popular. Since then, several other Internet companies, including Google and Yahoo , have come online with mapping services. In addition to interactive maps with zooming and recentering functions (these are universal), some services offer topographical maps, satellite images, weather and climate maps, demographic maps, and traffic information. The most sophisticated sites work with the Global Positioning System ( GPS ) to provide the wireless-equipped mobile user with moment-to-moment position data, as well as street-by-street directions to help the user get from the current location to a specific destination.

Google Maps and similar services have become very popular in mash-up applications. One such mash-up, HousingMaps, is a mash-up of Google Maps and Craigslist rental ads that displays geographical information for rental properties.

This was last updated in April 2006
SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • hacker

    A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.

  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close