Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

PRO - WEB

  • product positioning - Product positioning is the tailored presentation of a product or brand for a specific targeted demographic.
  • Programmer's Day - Programmer's Day celebrates the contributions of programmers to humanity.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • Qik - Qik is an online video streaming service that allows anyone with a strong wireless Internet connection and a video camera-equipped smartphone to broadcast live events.
  • reach - In Internet marketing, reach is how many different people visit a Web site to see an ad and also what percentage of these people fall into the audience to which an ad is targeted.
  • real life - Real life is a term used to describe what happens outside the Internet and implies that somehow the Internet furnishes us with a virtual life.
  • reciprocity - In negotiation, reciprocity is a mutual or cooperative exchange of favors or privileges.
  • red screen of death - The red screen of death is a term coined by some early testers of Longhorn (the code name for Microsoft's latest Windows operating system) who, in May 2005, came across an error message appearing against an all-red display screen.
  • return on marketing investment (ROMI) - Return on marketing investment (ROMI) is a metric used to measure the overall effectiveness of a marketing campaign to help marketers make better decisions about allocating future investments.
  • reverse DNS (rDNS) - Reverse DNS (rDNS) is a method of resolving an IP address into a domain name, just as the domain name system (DNS) resolves domain names into associated IP addresses.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • rogue - In general, a rogue is someone who strays from the accepted path, is mischievous, or is a cheat.
  • roundtripping - In information processing, roundtripping is the conversion (or, in some usages, the repeated conversion back and forth) of a document in one format such as Microsoft Word to a document in another format such as WordPerfect or HTML and then back again.
  • Safe Harbor - Safe Harbor is the name of a policy agreement established between the United States Department of Commerce and the European Union in November 2000.
  • Scooter - Scooter is the Web "crawler" for the AltaVista public search engine.
  • screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
  • script kiddy (or script kiddie) - Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • second-level domain (SLD) - A second-level domain (SLD) is the portion of a Uniform Resource Locator (URL) that identifies the specific and unique administrative owner associated with an Internet Protocol address (IP address).
  • self-sending spam - Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.
  • Semantic Web - The Semantic Web is an idea of World Wide Web inventor Tim Berners-Lee that the Web as a whole can be made more intelligent and perhaps even intuitive about how to serve a user's needs.
  • server farm (Web farm, Web server farm) - A server farm is a group of computers acting as servers and housed together in a single location.
  • sexting - Sexting is the act of sending or receiving sexually-explicit images and messages, typically between cell phones.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • sheepdip (sheep dipping or a footbath) - In computers, a sheepdip (or, variously, sheep dipping or a footbath) is the checking of media, usually diskettes or CD-ROMs, for viruses before they are used in a computer or network.
  • shopping cart - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • shoulder surfing - Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.
  • showrooming - Showrooming is the act of visiting a physical retail store to examine a product in person and then shopping online to purchase the item at a find lower price.
  • simultaneous localization and mapping - Simultaneous localization and mapping (SLAM) is the synchronous location awareness and recording of the environment in a map of a computer, device, robot, drone or other autonomous vehicle.
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • skyscraper - A skyscraper ad is a tall and narrow banner advertisement usually placed to the right of content on a Web page.
  • slacktivism - Slacktivism is taking action online in ways that involve little personal effort and have little immediate effect; the word is a portmanteau of slacker and activism.
  • SNAFU (situation normal, all f***ed up) - SNAFU is an acronym for "situation normal, all f***ed up.
  • snake oil - In cryptographic and other computer products, snake oil is a negative term used to describe exaggerated claims made by vendors who are overly optimistic or purposely seeking to take advantage of consumers who do not have the expertise to judge a product.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • snoop server - A snoop server is a server that uses a packet sniffer program to capture network traffic for analysis.
  • social curation - Social curation is collaborative sharing of Web content organized around one or more particular themes or topics.
  • social media - Social media is a collective term for websites and applications which focus on communication, community-based input, interaction, content-sharing and collaboration.
  • sock puppet - A sock puppet, in the context of online communications, is a fake identity created to promote someone or something through blogs, wikis, forums or social networking sites such as Facebook or Twitter.
  • sock puppet marketing - Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • source quench - Using the Internet Control Message Protocol (ICMP), a source quench is a message from one host computer to another telling it to reduce the pace at which it is sending packet to that host.
  • spam trap - A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • Stop Online Piracy Act (SOPA) and PIPA - The Stop Online Piracy Act (SOPA), also known as House Bill 3261, is legislation introduced in the United States House of Representatives to enforce current laws that make stealing intellectual property and trafficking in counterfeit goods illegal.
  • subscription economy - A subscription economy is a model for trade of desired content, products and services in exchange for recurring, scheduled payments.
  • superstitial - A superstitial is a Web ad format developed by Unicast, which calls itself a rich media company.
  • SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
  • synergy - In general, synergy (pronounced SIN-ur-jee, from Greek sunergia, meaning "cooperation," and also sunergos, meaning "working together") is the combined working together of two or more parts of a system so that the combined effect is greater than the sum of the efforts of the parts.
  • talking Trojan - A talking Trojan is a Trojan horse program that mocks the user of an infected PC with a repeating audio message while it deletes the entire contents of a hard drive.
  • technology addiction (internet addiction) - Technology addiction (Internet addiction) is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games despite negative consequences to the user of the technology.
  • teergrube - A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.
  • tl;dr (TL;DR) - TL;DR is an abbreviation for "too long; didn't read" that is used to indicate that the person posting about an article either didn't read it in its entirety or didn't read it at all.
  • ToFu, MoFu and BoFu - ToFu, MoFu and BoFu is a method used by sales and marketing professionals to pace and cater their approach to sales leads within a sales funnel, depending on the customer’s current phase of the purchase decision.
  • top-level domain (TLD) - A top-level domain (TLD) identifies the most general part of the domain name in an Internet address.
  • transition ad - A transition ad is a Web page containing a commercial message that appears temporarily between two other Web pages.
  • trap - In a Web site, a trap is a page that does not allow the reader to back up a previous page (the Back button on the toolbar is inoperable).
  • troll - As used on the Internet: As a verb, the practice of trying to lure other Internet users into sending responses to carefully-designed incorrect statements or similar "bait.
  • Tumblr - Tumblr is a free microblogging site.
  • Tux - Tux, the penguin, is the generally accepted official logo for the Linux operating system.
  • tweak freak (tweaker) - In quality assurance, tweaking is the process of making subtle variations in the environment in which a program is tested in order to produce unanticipated behaviors.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • typosquatting - Typosquatting is a form of Internet cybersquatting, based on the probability that a certain number of Internet users will mistype the name of a Web site (or actually its URL) when surfing the Web.
  • U (measurement) - A U is a standard unit of measure for designating the height in computer enclosures and rack cabinets.
  • UBE (unsolicited bulk email) - UBE (unsolicited bulk email) is a formal term for spam.
  • uber geek - An uber geek is a prominent or extreme example of the common geek.
  • unconference - An unconference is a conference organized, structured and led by the people attending it.
  • unique user - In Web marketing, a unique user is, for a specified period of time such as a day or month, an individual that has visited a Web site or received specific content, such as ads, e-mail, or newsletters.
  • uploading - Uploading is the transmission of a file from one computer system to another, usually larger computer system.
  • urban legend - An urban legend is a tale of contemporary folklore that purports to be true and is often designed to elicit an emotional response from the audience.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • user-generated content (UGC) - User-generated content (UGC) is the words and photos that unpaid contributors create and provide to publications, particularly Web properties.
  • venture capital (VC) - Venture capital (VC) is funding invested, or available for investment, in an enterprise that offers the probability of profit along with the possibility of loss.
  • vertical portal (vortal) - Vortal is also short for voice portal.
  • viral marketing - Viral marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users, creating a potentially exponential growth in the message's visibility and effect.
  • virtual community - A virtual community is a community of people sharing common interests, ideas, and feelings over the Internet or other collaborative networks.
  • virtual embodiment - Virtual embodiment is the perception of sensory feedback related to an individual’s virtual, non- physical body (also known as an avatar) and the effect it has on the individual’s cognition.
  • VKontakte (VK) - VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.
  • WAIS (Wide Area Information Servers) - WAIS (Wide Area Information Servers) is an Internet system in which specialized subject databases are created at multiple server locations, kept track of by a directory of servers at one location, and made accessible for searching by users with WAIS client programs.
  • walled garden - On the Internet, a walled garden is an environment that controls the user's access to Web content and services.
  • WAP (Wireless Application Protocol) - WAP (Wireless Application Protocol) is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access.
  • war dialer - A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • warez - Warez (pronounced as though spelled "wares" or possibly by some pronounced like the city of "Juarez") is a term used by software "pirates" to describe software that has been stripped of its copy-protection and made available on the Internet for downloading.
  • waving a dead chicken - Waving a dead chicken is a slang expression for an effort to solve a problem even when the effort is expected to be futile.
  • Wayback Machine - The Wayback Machine is a Web site that enables anyone to see what a particular Web site looked like at some time in the past - from 1996 to the present.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close