Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

WHI - ZOM

  • white hat - A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • whitelist - A whitelist is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.
  • wiki - A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site.
  • WikiLeaks - WikiLeaks is an independent, non-profit online media organization that publishes submissions of otherwise unavailable documents from anonymous sources.
  • wikinomics - Wikinomics is a term that describes the effects of extensive collaboration and user-participation on the marketplace and corporate world.
  • windows, icons, mouse, and pull-down menus (WIMP) - WIMP is an acronym describing the desktop user interface familiar to Windows and Mac computer users, significant features of which are windows, icons, a mouse, and pull-down menus.
  • Winsock - Winsock is a programming interface and the supporting program that handles input/output requests for Internet applications in a Windows operating system.
  • wireless Web - The wireless Web refers to use of the World Wide Web through a wireless device, such as a cellular telephone or personal digital assistant (PDA).
  • workaround - A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn't working.
  • XACML (Extensible Access Control Markup Language) - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • XING - XING is a European social networking website for business professionals.
  • xSP - xSP is a generic term for any kind of service provider on the Internet.
  • yak shaving - Yak shaving is programming lingo for the seemingly endless series of small tasks that have to be completed before the next step in a project can move forward.
  • zero rating - Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).
  • zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • zombie computer (zombie bot) - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close