Browse Definitions :
Definition

owned

Owned, in common slang, means decisively defeated, with the implication of domination and possession. The term is often used to describe the results of competition in sports, gaming and business.

The Jargon File offers these two meanings:

  1. Your condition when your machine has been cracked by a root exploit, and the attacker can do anything with it.
  2. To be dominated, controlled, mastered. For example, if you make a statement completely and utterly false, and someone else corrects it in a way that humiliates or removes you, you are said to “have been owned” by that person.

In social media and business, owned is also used to refer to general domination --  on Twitter, for example, if you post a compelling tweet that is widely retweeted, you might be said to have "owned Twitter." Intentionality is essential, however. A post that's widely shared because it's considered to demonstrate a failure of some sort doesn't qualify, even if it is the most prevalent tweet in people's feeds. It also leaves the poster open to being owned by people who respond to the original tweet most effectively.

Dominating the market for a technology is also referred to as owning it. Intel, for example, has been said to own the desktop and server processor market.

The slang usage of the word own is thought to have originated in hacker culture in the late 20th century, where it referred to gaining administrative control of a target computer. In leetspeak, owned is spelled in a number of ways, including 0wn3d. From hacker culture, this usage of own moved into gamer culture, where it is commonly spelled pwn.

This was last updated in April 2017

Continue Reading About owned

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • computer forensics (cyber forensics)

    Computer forensics is the application of investigation and analysis techniques to gather and preserve evidence from a particular ...

  • multifactor authentication (MFA)

    Multifactor authentication (MFA) is a security technology that requires more than one method of authentication from independent ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close