Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

32- - CYB

  • 32-bit IP addressing - 32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system).
  • 3PL (third-party logistics) - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • AAA server (authentication, authorization, and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • AAAA resource record - An AAAA resource record is a record that stores a single IPv6 address.
  • Aakash tablet computer - Aakash is a government-subsidized Android tablet computer developed by the Indian Institute of Technology in conjunction with a UK-based company called DataWind.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • Active Server Page (ASP) - ASP is also an abbreviation for application service provider.
  • address - An address can mean the unique location of either ( an Internet server, (2) a specific file (for example, a Web page), or (3) an e-mail user.
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity, such as a device, a file, a server, or a networked computer.
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio and multimedia and Rich Internet Applications (RIA) on a computer or supported mobile device.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • altcoin - An altcoin is any digital cryptocurrency similar to Bitcoin.
  • alternate newsgroup (alt.) - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • Amazon Cloud Drive - Amazon Cloud Drive is an online storage service that allows users to upload and access music, videos, documents and photos from Web-connected devices.
  • Amazon Mechanical Turk - Amazon Mechanical Turk is a web service application program interface (API) that allows developers to integrate human intelligence into remote procedure calls (RPC).
  • Amazon Prime - Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.
  • analog telephone adapter (ATA) - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • anti-replay protocol - The anti-replay protocol is part of the Internet Engineering Task Force (IETF) Internet Protocol Security (IPSec) standard.
  • anycast - In Internet Protocol Version 6 (IPv6), anycast is communication between a single sender and the nearest of several receivers in a group.
  • Apache - Apache is a freely available Web server that is distributed under an "open source" license.
  • API management - API management is the process by which an organization creates, oversees and controls application program interfaces (APIs) in a secure and scalable environment.
  • Apple TV (Apple TV 4) - Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.
  • Application Link Enabling (ALE) - Application Link Enabling (ALE) is a mechanism for the exchange of business data between loosely-coupled R/3 applications built by customers of SAP, the enterprise resource management program.
  • application server - An application server is a server program in a computer in a distributed network that provides the business logic for an application program.
  • Archie - Archie is a program that allows you to search the files of all the Internet FTP servers that offer anonymous FTP.
  • Artificial Intelligence of Things (AIoT) - The Artificial Intelligence of Things (AIoT) is the combination of artificial intelligence (AI) technologies with the Internet of Things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.
  • AS1 (Applicability Statement 1) - AS1 (Applicability Statement is a specification for Electronic Data Interchange (EDI) communications between businesses using e-mail protocols.
  • AS2 (Applicability Statement 2) - AS2 (Applicability Statement 2) is a specification for Electronic Data Interchange (EDI) between businesses using the Internet's Web page protocol, the Hypertext Transfer Protocol (HTTP).
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • attention minute - The attention minute is a metric used to determine how much time a user is actually engaged with content.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • autonomous system (AS) - On the Internet, an autonomous system (AS) is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).
  • AWS IoT Button - The AWS IoT Button is a programmable, Wi-Fi-enabled handheld device that allows developers to push a button to execute a variety of actions in the Amazon Web Services public cloud.
  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • BeeMe (MIT Media Lab) - BeeMe is a web-based social experiment that will be hosted by the MIT Media Lab at 11pm on October 31, 2018.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is the protocol underlying the global routing system of the internet.
  • Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
  • Bitcoin - Bitcoin is a digital currency (also called crypto-currency) that is not backed by any country's central bank or government.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • BlackBerry World - BlackBerry World is the official app store for BlackBerry smartphones and tablets.
  • blade server - A blade server, sometimes referred to as a high-density server, is a compact device containing a computer used to manage and distribute data in a collection of computers and systems, called a network.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • bookmark - Using a World Wide Web browser, a bookmark is a saved link to a Web page that has been added to a list of saved links.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in a distributed computing or grid computing environment.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
  • cache (computing) - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • Centrino - Centrino is a technology package from Intel that provides built-in wireless support for laptop computers while making it possible to run a laptop all day (up to seven hours) without a battery recharge.
  • CFML (ColdFusion Markup Language) - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • churn (agitation or turnover) - In a general context, churn is a synonym for agitation or turnover.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) -- also known as supernetting -- is a method of assigning Internet Protocol (IP) addresses that improves the efficiency of address distribution and replaces the previous system based on class A, class B and class C networks.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • common gateway interface (CGI) - Also see FastCGI.
  • Common Language Infrastructure (CLI) - Part of Microsoft's .
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Compact HTML (CHTML) - Compact HTML (CHTML or cHTML) is a subset of standard Hypertext Markup Language (HTML) adapted for use with small computing devices such as personal digital assistants (PDAs), cellular phones, and smartphones.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connection-oriented - In telecommunications, connection-oriented describes a means of transmitting data in which the devices at the end points use a preliminary protocol to establish an end-to-end connection before any data is sent.
  • connectionless - In telecommunication, connectionless describes communication between two network end points in which a message can be sent from one end point to another without prior arrangement.
  • consensus algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • Constellation - Constellation was the early name for the Communicator browser and related programs from Netscape Communications.
  • consumerization of IT - IT consumerization is the blending of personal and business use of technology devices and applications.
  • content - Many people agree that on the World Wide Web, "content is King.
  • content filtering (information filtering) - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • cookie - A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time.
  • corportal (Corporate Portal) - Corportal is short for "corporate portal.
  • CSS (cascading style sheets) - This definition explains the meaning of CSS (cascading style sheets) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • Curl - Curl is an object-oriented programming language designed to replace HTML, JavaScript, and related tools as a means for creating interactive Web pages.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • cyber - Cyber is a prefix used to describe a person, thing, or idea as part of the computer and information age.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close