Browse Definitions :

Consumer Technology

Definitions about consumer technology including Internet acronyms, tech lingo, multimedia definitions, words about personal computing and peripherals as well as terms used in wireless and mobile computing.

Desktops and laptops

Terms related to PCs, including definitions about desktop computers and words and phrases about computer components.

  • unified endpoint management (UEM)

    Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.

  • operating system (OS)

    An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.

  • chiplet

    A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.

View All Desktops and laptops Definitions

End user hardware

Terms related to peripheral devices including definitions about keyboards or mice and words and phrases about printers, monitors, digital cameras and scanners.

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

  • virtual storage area network (VSAN)

    A virtual storage area network (VSAN) is a logical partition in a physical storage area network (SAN).

  • backup

    Backup refers to the copying of physical or virtual files or databases to a secondary location for preservation in case of equipment failure or catastrophe.

View All End user hardware Definitions Back to Top

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

  • dumpster diving

    Dumpster diving is looking for treasure in someone else's trash.

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts to gain unauthorized access to information systems.

View All Internet acronyms and lingo Definitions Back to Top

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • HTTP (Hypertext Transfer Protocol)

    HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.

  • wireless broadband (WiBB)

    Wireless broadband (WiBB) is high-speed internet and data service delivered through a wireless local area network (WLAN) or wireless wide area network (WWAN).

View All Internet technologies Definitions Back to Top

Multimedia and graphics

Terms related to multimedia, including graphics, animation and video definitions and words and phrases about images and sound.

  • CAD (computer-aided design)

    CAD (computer-aided design) is the use of computer-based software to aid in design processes.

  • video conferencing

    Video conferencing is live, visual connection between two or more remote parties over the internet that simulates a face-to-face meeting.

  • Zoom fatigue (virtual meeting fatigue)

    Zoom fatigue, also known as virtual meeting fatigue, is the feeling of exhaustion that often occurs after attending a series of virtual video meetings. In this context, the label "Zoom" is used generically; the phenomenon can be applied to any video conferencing platform that permits gallery views.

View All Multimedia and graphics Definitions Back to Top

Personal computing

Terms related to personal computers, including definitions about computers sold as consumer products and words and phrases about laptops, tablets and smartphones.

  • Software as a Service (SaaS)

    Software as a service (SaaS) is a software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.

  • PaaS (platform as a service)

    PaaS (platform as a service) is a cloud computing model where a third-party provider delivers hardware and software tools to users over the internet.

  • social media

    Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and collaboration.

View All Personal computing Definitions Back to Top

Printers

Terms related to printers, including definitions about scanners and words and phrases about inkjet, laser, photo and all-in-one printers.

  • offset printing (offset lithography)

    Offset printing, also called offset lithography, is a method of mass-production printing in which the images on metal plates are transferred (offset) to rubber blankets or rollers and then to the print media.

  • rafts, skirts and brims

    Rafts, skirts and brims are structures created at the base of the bottom of a 3D print. These structures are temporary and used to improve print reliability and quality.

  • print bed

    A print bed is the surface on a 3D printer where a print head lays down the materials that make up a 3D print.

View All Printers Definitions Back to Top

Wireless and mobile

Terms related to wireless and mobile technology, including definitions about consumer mobile technology devices and communication technologies such as Wi-Fi, WiMAX and LTE.

View All Wireless and mobile Definitions Back to Top

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • PKI (public key infrastructure)

    PKI (public key infrastructure) is the underlying framework that enables entities -- users and servers -- to securely exchange ...

  • obfuscation

    Obfuscation means to make something difficult to understand.

  • dumpster diving

    Dumpster diving is looking for treasure in someone else's trash.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close