Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

INF - PRO

  • infomediary - An infomediary is a Web site that provides specialized information on behalf of producers of goods and services and their potential customers.
  • information superhighway (infobahn) - Information superhighway is a term that was used mainly in the 1990s to describe a national communications network that would span the United States and allow Americans to quickly access and exchange information via voice, data, video and other services.
  • infosurfing - Infosurfing is using the Internet and World Wide Web so that you get maximum information in the shortest amount of time, which for many people means favoring textual content over images.
  • initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
  • Initiative for a Competitive Online Marketplace (ICOMP) - Initiative for a Competitive Online Marketplace (ICOMP) is a Microsoft-sponsored lobbying organization for companies and organizations that engage in online business.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • intellectual capital - Intellectual capital is knowledge that can be exploited for some money-making or other useful purpose.
  • internesia - Internesia is an inability to remember which Web site or other Internet facility you saw an item of information on.
  • internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet Open Trading Protocol (IOTP) - Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet traffic - A quick way to understand the volume of traffic in some part of the Internet is to read the current latency figures that are being reported on The Internet Health Report, a service provided by Keynote at http://www.
  • Internet2 - Internet2 is a collaboration among more than 100 U.
  • IPPP (Internet presence provider and promoter) - An IPPP (Internet presence provider and promoter) is a company that helps an enterprise create a Web site, arrange for hosting (housing, maintaining, and providing Internet access) for the Web site, and promote an audience for it.
  • IPv6 (Internet Protocol Version 6) - IPv6 is a set of specifications from the Internet Engineering Task Force that improves IPv4 by extending IP addresses from 32 bits to 128 bits.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • Japanese emoticons - In Japan, users have worked out emoticons (text-based "smiley faces") adapted to their culture.
  • Joe job - A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.
  • jump page - In Web advertising and marketing, a jump page is a Web page that is made to appear temporarily in order to capture the user's attention as a promotion or to gather user information in a survey.
  • Kano Model - The Kano Model is a product development theory which is centered on customer satisfaction.
  • Ken Burns effect - Ken Burns effect is the use of still photographs along with zooming, panning and transitions such as fading as the base for video content.
  • keyword density - Keyword density is the percentage of incidences of a given keyword on a web page relative to the total word count on that page.
  • keyword stuffing - Keyword stuffing is the practice of inserting a large number of keywords into Web page content and meta tags in the attempt to artificially increase the page's ranking in search results.
  • lamer - Lamer is a term used on interactive Web sites to describe an irritating or immature participant.
  • LAMP (Linux, Apache, MySQL, PHP) - LAMP is an open source Web development platform that uses Linux as the operating system, Apache as the Web server, MySQL as the relational database management system and PHP as the object-oriented scripting language.
  • LARP (Live Action Role Playing) - LARP (Live Action Role Playing), also called LARPing, is a character-driven type of gameplay that is conducted in the physical world.
  • leet speak (leet) - Leet speak, also known as simply leet, is the substitution of a word's letters with numbers or special characters.
  • lifecasting - Lifecasting is 24/7 broadcasting of events in a person’s life through digital media.
  • link spam - Link spam is the posting of out-of-context links on websites, discussion forums, blog comments, guestbooks or any other online venue that displays user comments.
  • linkbaiting - Linkbaiting is the practice of crafting content that is designed to compel people who view it to link to it.
  • list washing - In the language of spam, list washing is the process of removing an e-mail address from a mailing list when the recipient either requests removal or complains to the sender's ISP (Internet service provider) that he is being spammed.
  • logic bomb - A logic bomb, sometimes referred to as slag code, is a string of malicious code used to cause harm to a network when the programmed conditions are met.
  • logo - A logo is a graphic image chosen to represent a company or organization and is uniquely designed for easy recognition.
  • long tail - The long tail is a frequency distribution pattern in which occurences are most densely clustered close to the Y-axis and the distribution curve tapers along the X-axis.
  • long-tail keywords - Long-tail keywords, in the context of advertising and SEO, are detailed keyword phrases that a potential customer might use to search online when ready to purchase.
  • look-to-book ratio - The look-to-book ratio is a figure used in the travel industry that shows the percentage of people who visit a travel Web site compared to those who actually make a purchase.
  • Luddite - A Luddite is a person who dislikes technology, especially technological devices that threaten existing jobs or interfere with personal privacy.
  • lurking - Lurking is the very common practice of reading an online or e-mail discussion without taking part in the discussion.
  • maker movement - The maker movement is a cultural trend that places value on an individual's ability to be a creator of things as well as a consumer of things.
  • malware - Malware, or malicious software, is any program or file that is harmful to a computer user.
  • market share - Market share is the percentage of sales in a market acquired by a particular company.
  • masthead - On the Internet, a masthead is a graphic image or text title at the top of a Web page that identifies the Web site and, sometimes, the particular section of the site.
  • matrix - Apart from information technology, matrix (pronounced MAY-triks) has a number of special meanings.
  • MBone (Multicast Internet) - The MBone, now sometimes called the Multicast Internet, is an arranged use of a portion of the Internet for Internet Protocol (IP) multicasting (sending files - usually audio and video streams - to multiple users at the same time somewhat as radio and TV programs are broadcast over airwaves).
  • menu bar - The menu bar is the part of a browser or application window, typically at the top left side, that houses drop-down menus that allow the user to interact with the content or application in various ways.
  • microblogging - Microblogging is a web service that allows the subscriber to broadcast short messages to other subscribers of the service.
  • Millennials (Generation Y) - Millennials, also known as Generation Y, is a demographic that includes individuals who reached adulthood around the turn of the 21st century.
  • MIM (MME) - A MIM or MME file is a file in the Multi-Purpose Internet Mail Extensions (MIME) format that is created by some e-mail programs, including that of America Online (AOL), to encapsulate e-mail that contains image or program attachments.
  • MIME (Multi-Purpose Internet Mail Extensions) - What is MIME? MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that lets people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP).
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mobile computing (nomadic computing) - Mobile computing is the use of portable computing devices in conjunction with mobile technology that enables users to access the internet and data on mobile devices anytime, anywhere.
  • mouse potato - A mouse potato is the computer equivalent of television's couch potato : someone who tends to spend a great deal of leisure time in front of the computer in much the same way the couch potato does in front of the television.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • multi-channel network (MCN) - A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.
  • munge - Munge is (a verb, used in a derogatory sense, meaning to imperfectly transform information, or (2) a noun meaning a comprehensive rewrite of a routine, data structure, or the whole program.
  • munging - Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.
  • nagware (annoyware) - On the Web, nagware (sometimes called "annoyware") is programming that presents the user with one or more pop-up windows or alerts when an application is launched or closed (sometimes both), reminding the user to register, purchase the application, or take some other action.
  • Napster - Napster is a controversial application that allows people to share music over the Internet without having to purchase their own copy on CD.
  • NAT64 - NAT64 is a proposed mechanism for translating IPv6 packets to IPv4 packets and vice-versa.
  • National Electrical Code (NEC) - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the United States.
  • NDIS (Network Driver Interface Specification) - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • nearables - Nearables are low-power transmitters that activate in the presence of a Bluetooth-enabled or Near Field Communication (NFC-enabled) computing device.
  • nerd - A nerd is a technically bright but socially inept person.
  • Net Neutrality - Net neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source.
  • netiquette - Netiquette is etiquette on the Internet.
  • netizen - The word netizen seems to have two similar meanings.
  • netsplit - In using an Internet Relay Chat (IRC) network, a netsplit is the loss of contact between two IRC servers.
  • NIC handle (Network Information Center handle) - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • nit - In information technology as elsewhere, a nit (pronounced NIHT) is a small, usually unimportant imperfection in something.
  • nofollow - Nofollow is a meta tag that can be added to a site’s robots.
  • NORAD Santa tracker - Each year, NORAD tracks the geographical location of Santa Claus as he makes his annual trip delivering gifts to children around the world and makes that information available to the general public.
  • nym - A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity.
  • OpenBSD - OpenBSD is a free open source operating system based upon the Berkeley Software Distribution (BSD) for UNIX.
  • Osborne Effect - The Osborne Effect is a reduction in sales of current products after the announcement of a future product.
  • out of the box - "Out of the box" is an expression that describes nonconformal, creative thinking.
  • oversharing - Oversharing is the disclosure of an inappropriate amount of detail.
  • P3P (Platform for Privacy Preferences) - P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements.
  • packet monkey - On the Internet, a packet monkey is someone (see cracker, hacker, and script kiddy) who intentionally inundates a Web site or network with data packets, resulting in a denial-of-service situation for users of the attacked site or network.
  • pagejacking - Pagejacking is stealing the contents of a Web site by copying some of its pages, putting them on a site that appears to be the legitimate site, and then inviting people to the illegal site by deceptive means - for example, by having the contents indexed by major search engines whose results in turn link users to the illegal site.
  • PageRank - PageRank (PR) is Google’s main method of ranking web pages for placement on a search engine results page (SERP).
  • passive FTP - Passive FTP (sometimes referred to as PASV FTP because it involves the FTP PASV command) is a more secure form of data transfer in which the flow of data is set up and initiated by the File Transfer Program (FTP) client rather than by the FTP server program.
  • path to profitability (P2P) - Path to profitability (sometimes abbreviated as P2P, which also stands for peer-to-peer) is a term that refers to a business plan that is designed to take an enterprise from startup to turning a profit.
  • PEBCAK (problem exists between chair and keyboard) - PEBCAK, one of many terms used in Internet chatting, stands for "problem exists between chair and keyboard," meaning it's a problem in user understanding or behavior rather than something wrong with hardware or software.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • ping - Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.
  • ping of death - On the Internet, ping of death is a denial of service (DoS) attack caused by an attacker deliberately sending an IP packet larger than the 65,536 bytes allowed by the IP protocol.
  • pixie dust or antiferromagnetically-coupled (AFC) media - Pixie dust is the informal name that IBM is using for its antiferromagnetically-coupled (AFC) media technology, which can increase the data capacity of hard drives to up to four times the density possible with current drives.
  • pluton - A pluton is an orbital body that is distinguished from a traditional planet by the length of its orbit, the aspect of that orbit and the shape of the orbit, which is far from circular.
  • pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.
  • pop-up ad - A pop-up ad is a pop-up window used for advertising.
  • pop-up download (or download pop-up) - A pop-up download (sometimes called a download pop-up) is a pop-up window that asks the user to download a program to their computer's hard drive.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • power-up (or power-on) - Power-up (or the synonym "power-on") is a verb meaning to apply electrical power to a device - that is, to "turn it on" as most of us would say about turning on a light switch when entering a dark room.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close