Browse Definitions :
Definition

single-serving site

Contributor(s): Ivy Wigmore

A single-serving site is a one-page, one-purpose website with a dedicated domain name.  

The oldest and perhaps simplest single-serving site is purple.com, which is an undifferentiated display of the color purple.  Many single-serving sites provide a function for the user.  For example, LMGTFY (Let Me Google That For You) creates a demonstration of how to conduct a user-specified Google search. Users can share links to the demos with people who ask them questions they could have just as easily researched themselves.  A number of sites answer a single yes-or-no-question, such as “Is it Tuesday?”, “Is it Christmas” and “Is Twitter down today?”

Here are a few other examples of single-serving sites:

  • Are You Tired? has a plain white background, the text “Are you tired?” and “Tell us why,” along with an email link so users can do so.
  • Am I awesome? provides randomly-generated positive responses to the question.
  • What is my IP? displays the user’s IP address.
  • Literally Unbelievable documents Facebook comments on stories from The Onion from readers who don’t realize that it’s a satire magazine.
  • Definitely informs visitors of the correct spelling of that word and lists all the common misspellings.  It is most vehement about the common misspelling of “defiantly,” which originated as a spellcheck or auto-correct error (also known as the Cupertino effect.)
  • Misanthropebook is a single-page, non-interactive parody of Facebook.
  • The Daily Nice is a picture of something that made the site owner happy each day.
  • Several websites claiming to be the last page of the Internet congratulate the user on reaching the end and exhort them to turn off their computers and go outside.

Jason Kottke, owner of one of the longest-running blogs on the Internet, created the term “single-serving site” in 2008 to describe what he saw as an increasing trend.

This was last updated in December 2013

Continue Reading About single-serving site

SearchCompliance

SearchSecurity

  • cyber attack

    A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to ...

  • backdoor (computing)

    A backdoor is a means to access a computer system or encrypted data that bypasses the system's customary security mechanisms.

  • post-quantum cryptography

    Post-quantum cryptography, also called quantum encryption, is the development of cryptographic systems for classical computers ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud SLA (cloud service-level agreement)

    A cloud SLA (cloud service-level agreement) is an agreement between a cloud service provider and a customer that ensures a ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

Close