Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

HAI - OUT

  • haiku error message - A haiku error message is a poem in the Japanese form on a page advising the user that an Internet problem, such as a 404 error, means that their request cannot be satisfied.
  • hash buster - A hash buster is a program that generates a string of text for insertion in a spam message so that, to a spam filter, the e-mail appears to be a different message each time it is sent.
  • hashtag - A hashtag is atag used to categorize posts on Twitter (tweets) according to topics.
  • HAVA (Help America Vote Act of 2002) - The Help America Vote Act of 2002 (HAVA)is a federal program that reformed aspects of the United States election system.
  • HELLO packet - In the Open Shortest Path First (OSPF) communications protocol - which enables network routers to share information with each other, a HELLO packet is a special packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships.
  • HiPPO (highest paid person's opinion, highest paid person in the office) - HiPPOs (highest paid person's opinions) is a term used to describe an organization's reliance on executive instinct rather than data in the decision-making process.
  • homeostasis - Homeostasis is the automatic, dynamic maintenance of the optimal internal conditions for functioning in an organism.
  • honey monkey - A honey monkey is a virtual computer system that is programmed to lure, detect, identify and neutralize malicious activity on the Internet.
  • honeypot (computing) - A honeypot is a network-attached system set up as a decoy to lure cyberattackers and to detect, deflect or study hacking attempts in order to gain unauthorized access to information systems.
  • hosting (Web site hosting, Web hosting, and Webhosting) - Hosting (also known as Web site hosting, Web hosting, and Webhosting) is the business of housing, serving, and maintaining files for one or more Web sites.
  • hyper - As an adjective, hyper is slang for "keyed up" or "overwrought.
  • Hypertext Transfer Protocol daemon (HTTPD) - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • ice - Ice, jello, and liquid are related terms describing three approaches to controlling content placement on a Web page.
  • incentivize - Incentivize is to offer a reward, such as money or a free vacation, in hopes of motivating an individual to perform a specific action, such as enter a contest or work longer hours without being paid.
  • iNet - An iNet (pronounced AI-neht) is any network that uses the Internet Protocol (IP).
  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
  • infosurfing - Infosurfing is using the Internet and World Wide Web so that you get maximum information in the shortest amount of time, which for many people means favoring textual content over images.
  • initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
  • Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • integrated access management (IAM) - Integrated access management (IAM) is a combination of business processes, policies and technologies that allows organizations to provide secure access to confidential data.
  • intellectual capital - Intellectual capital is knowledge that can be exploited for some money-making or other useful purpose.
  • internalnet - An internalnet is a network that transmits information between computing devices located inside (and perhaps on) a living body.
  • internesia - Internesia is an inability to remember which Web site or other Internet facility you saw an item of information on.
  • internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is the moving network made up of IoT enabled cars through the use of modern electronics and integration of the information to help maintain traffic flow, and to perform more effective fleet management and accident avoidance.
  • Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
  • Internet2 - Internet2 is a collaboration among more than 100 U.
  • IPPP (Internet presence provider and promoter) - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • Japanese emoticons - In Japan, users have worked out emoticons (text-based "smiley faces") adapted to their culture.
  • Joe job - A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.
  • jump page - In Web advertising and marketing, a jump page is a Web page that is made to appear temporarily in order to capture the user's attention as a promotion or to gather user information in a survey.
  • Kano Model - The Kano Model is a product development theory which is centered on customer satisfaction.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • keyword density - Keyword density is the percentage of incidences of a given keyword on a web page relative to the total word count on that page.
  • keyword stuffing - Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results.
  • lamer - Lamer is a term used on interactive Web sites to describe an irritating or immature participant.
  • LAMP (Linux, Apache, MySQL, PHP) - LAMP is an open source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the relational database management system and PHP as the object-oriented scripting language.
  • LARP (Live Action Role Playing) - LARP (Live Action Role Playing), also called LARPing, is a character-driven type of gameplay that is conducted in the physical world.
  • leet speak (leet) - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • lifecasting - Lifecasting is 24/7 broadcasting of events in a person’s life through digital media.
  • likebaiting - Likebaiting is the practice of trying to compel Facebook users to click the Like button associated with a piece of content.
  • link spam - Link spam is the posting of out-of-context links on websites, discussion forums, blog comments, guestbooks or any other online venue that displays user comments.
  • linkbaiting - Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it.
  • list washing - In the language of spam, list washing is the process of removing an e-mail address from a mailing list when the recipient either requests removal or complains to the sender's ISP (Internet service provider) that he is being spammed.
  • logic bomb - A logic bomb, sometimes referred to as slag code, is a string of malicious code used to cause harm to a network when the programmed conditions are met.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • long tail - The long tail is a frequency distribution pattern in which occurences are most densely clustered close to the Y-axis and the distribution curve tapers along the X-axis.
  • long-tail keywords - Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • lurking - Lurking is the very common practice of reading an online or e-mail discussion without taking part in the discussion.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • malware (malicious software) - Malware, or malicious software, is any program or file that is harmful to a computer user.
  • Mapuccino - Mapuccino is a Java applet or small program that can show a visual map of how a Web site is organized.
  • market share - Market share is the percentage of sales in a market acquired by a particular company.
  • masthead - On the Internet, a masthead is a graphic image or text title at the top of a Web page that identifies the Web site and, sometimes, the particular section of the site.
  • matrix - Apart from information technology, matrix (pronounced MAY-triks) has a number of special meanings.
  • MBone (Multicast Internet) - The MBone, now sometimes called the Multicast Internet, is an arranged use of a portion of the Internet for Internet Protocol (IP) multicasting (sending files - usually audio and video streams - to multiple users at the same time somewhat as radio and TV programs are broadcast over airwaves).
  • menu bar - The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.
  • microblogging - Microblogging is a web service that allows the subscriber to broadcast short messages to other subscribers of the service.
  • Millennials (Generation Y) - Millennials, also known as Generation Y, is a demographic that includes individuals who reached adulthood around the turn of the 21st century.
  • MIM (MME) - A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of America Online (AOL), to encapsulate e-mail that contains image or program attachments.
  • MIME (Multi-Purpose Internet Mail Extensions) - What is MIME? MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).
  • mobile computing (nomadic computing) - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • mouse potato - A mouse potato is the computer equivalent of television's couch potato : someone who tends to spend a great deal of leisure time in front of the computer in much the same way the couch potato does in front of the television.
  • moved to Atlanta - Moved to Atlanta is Internet slang for the 404 status code, the frequently seen "page not found" error.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • multi-channel network (MCN) - A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.
  • munge - Munge is (a verb, used in a derogatory sense, meaning to imperfectly transform information, or (2) a noun meaning a comprehensive rewrite of a routine, data structure, or the whole program.
  • munging - Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.
  • Murkogram - A Murkogram is spam (unsolicited commercial e-mail) that includes a disclaimer to the effect that the message cannot be considered spam because it is in compliance with Bill S.
  • nagware (annoyware) - On the Web, nagware (sometimes called "annoyware") is programming that presents the user with one or more pop-up windows or alerts when an application is launched or closed (sometimes both), reminding the user to register, purchase the application, or take some other action.
  • Napster - Napster is a controversial application that allows people to share music over the Internet without having to purchase their own copy on CD.
  • NAT64 - NAT64 is a proposed mechanism for translating IPv6 packets to IPv4 packets and vice-versa.
  • National Electrical Code (NEC) - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the United States.
  • NDIS (Network Driver Interface Specification) - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • nearables - Nearables are low-power transmitters that activate in the presence of a Bluetooth-enabled or Near Field Communication (NFC-enabled) computing device.
  • nerd - A nerd is a technically bright but socially inept person.
  • Net Neutrality - Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
  • netiquette - Netiquette is etiquette on the Internet.
  • netizen - The word netizen seems to have two similar meanings.
  • netroots - Netroots is a term describing populist campaigns and movements sparked, promoted and conducted over the Internet.
  • netsplit - In using an Internet Relay Chat (IRC) network, a netsplit is the loss of contact between two IRC servers.
  • NIC handle (Network Information Center handle) - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • nit - In information technology as elsewhere, a nit (pronounced NIHT) is a small, usually unimportant imperfection in something.
  • nofollow - Nofollow is a meta tag that can be added to a site’s robots.
  • NORAD Santa tracker - Each year, NORAD tracks the geographical location of Santa Claus as he makes his annual trip delivering gifts to children around the world and makes that information available to the general public.
  • nym - A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity.
  • OneWebDay (OWD) - OneWebDay (OWD) is a celebration of the Internet's ability to foster communication, collaboration and participation.
  • OpenBSD - OpenBSD is a free open source operating system based upon the Berkeley Software Distribution (BSD) for UNIX.
  • Osborne Effect - The Osborne Effect is a reduction in sales of current products after the announcement of a future product.
  • out of the box - "Out of the box" is an expression that describes nonconformal, creative thinking.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close