Browse Definitions :

Internet acronyms and lingo

Terms related to Internet acronyms and lingo, including slang definitions and jargon about texting, Twitter and other social networking sites.

WEB - ZOM

  • Web 2.0 - Web 2.0 are websites and applications that make use of user-generated content for end-users.
  • Web 2.0 suicide - Web 2.0 suicide is the obliteration of information related to an individual's online persona on social networking sites, blogs and other web-based venues.
  • Web texting - Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.
  • Web year - A Web year is the length of time it takes for Internet technology to evolve as much as technology in another environment might evolve in a calendar year.
  • Webification - Webification (sometimes seen with a lower case w) is the act of converting content from its original format into a format capable of being displayed on the World Wide Web.
  • Webify - The act of converting content from its original format into a format capable of being displayed on the World Wide Web.
  • Webisode - A Webisode is a single push technology episode.
  • weblog - A weblog, sometimes written as web log or Weblog, is a Web site that consists of a series of entries arranged in reverse chronological order, often updated on frequently with new information about particular topics.
  • wetware - Wetware refers to programmers, developers, systems administrators, cloud and IT architects and other employees that directly affect how servers, applications, networks and the rest of an IT system functions.
  • white hat - A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  • white space device (WSD) - A white space device is an FCC-certified wireless device that can be used without an exclusive broadcast license in the RF spectrum below 700 MHz: underutilized, unlicensed portions of the spectrum called white space.
  • whitelist - A whitelist is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.
  • wiki - A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site.
  • WikiLeaks - WikiLeaks is an independent, non-profit online media organization that publishes submissions of otherwise unavailable documents from anonymous sources.
  • wikinomics - Wikinomics is a term that describes the effects of extensive collaboration and user-participation on the marketplace and corporate world.
  • windows, icons, mouse, and pull-down menus (WIMP) - WIMP is an acronym describing the desktop user interface familiar to Windows and Mac computer users, significant features of which are windows, icons, a mouse, and pull-down menus.
  • Winsock - Winsock is a programming interface and the supporting program that handles input/output requests for Internet applications in a Windows operating system.
  • wireless Web - The wireless Web refers to use of the World Wide Web through a wireless device, such as a cellular telephone or personal digital assistant (PDA).
  • workaround - A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn't working.
  • XACML (Extensible Access Control Markup Language) - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • XING - XING is a European social networking website for business professionals.
  • xSP - xSP is a generic term for any kind of service provider on the Internet.
  • yak shaving - Yak shaving is programming lingo for the seemingly endless series of small tasks that have to be completed before the next step in a project can move forward.
  • zero rating - Zero rating is the practice of not charging customers for data use on specific websites and services by Internet service providers (ISPs) and mobile service providers (MSPs).
  • zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • zombie computer (zombie bot) - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

Close