Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

.SH - COM

  • .shtml - A Web file with the suffix of ".
  • 32-bit IP addressing - 32-bit IP addressing is the IP address scheme used in Internet Protocol 4 (IPv6 uses a 128-bit system).
  • 3PL (third-party logistics) - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • 6to4 - 6to4 is a tunneling mechanism used to transfer IPv6 (Internet Protocol version 6) packets over an IPv4 infrastructure, typically the IPv4 Internet.
  • AAA server (authentication, authorization, and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization, and accounting (AAA) services.
  • AAAA resource record - An AAAA resource record is a record that stores a single IPv6 address.
  • Aakash tablet computer - Aakash is a government-subsidized Android tablet computer developed by the Indian Institute of Technology in conjunction with a UK-based company called DataWind.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • ActionScript - ActionScript is an object-oriented programming (OOP) language that is designed specifically for Web site animation.
  • Active Server Page (ASP) - ASP is also an abbreviation for application service provider.
  • address - An address can mean the unique location of either ( an Internet server, (2) a specific file (for example, a Web page), or (3) an e-mail user.
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity, such as a device, a file, a server, or a networked computer.
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio and multimedia and Rich Internet Applications (RIA) on a computer or supported mobile device.
  • aggregate - In general, to aggregate (verb, from Latin aggregare meaning to add to) is to collect things together.
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • altcoin - An altcoin is any digital cryptocurrency similar to Bitcoin.
  • alternate newsgroup (alt.) - "alt." is the prefix for any of the hundreds of "alternate" user-originated newsgroups that are part of Usenet.
  • Amazon Cloud Drive - Amazon Cloud Drive is an online storage service that allows users to upload and access music, videos, documents and photos from Web-connected devices.
  • Amazon Mechanical Turk - Amazon Mechanical Turk is a web service application program interface (API) that allows developers to integrate human intelligence into remote procedure calls (RPC).
  • Amazon Prime - Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.
  • analog telephone adapter (ATA) - An analog telephone adaptor (ATA) is a device used to connect a standard telephone to a computer or network so that the user can make calls over the Internet.
  • anonymous Web surfing (Web anonymizer, SafeWeb) - Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited.
  • anti-replay protocol - The anti-replay protocol is part of the Internet Engineering Task Force (IETF) Internet Protocol Security (IPSec) standard.
  • antidisintermediation - In commerce, antidisintermediation is a term used to describe the preservation of intermediary positions.
  • anycast - In Internet Protocol Version 6 (IPv6), anycast is communication between a single sender and the nearest of several receivers in a group.
  • Apache - Apache is a freely available Web server that is distributed under an "open source" license.
  • API management - API management is the process of overseeing application programming interfaces (APIs) in a secure, scalable environment.
  • Apple TV (Apple TV 4) - Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.
  • appliance computing - Appliance computing is an Internet-based computing architecture where software applications reside on a Web server rather than on the end-user's workstation.
  • Application Link Enabling (ALE) - Application Link Enabling (ALE) is a mechanism for the exchange of business data between loosely-coupled R/3 applications built by customers of SAP, the enterprise resource management program.
  • application server - An application server is a server program in a computer in a distributed network that provides the business logic for an application program.
  • arachnotaxis - Arachnotaxis is the use of a table or structured list of URLs for Web sites (or words that hyperlink to Web sites) in order to help locate them.
  • Archie - Archie is a program that allows you to search the files of all the Internet FTP servers that offer anonymous FTP.
  • ARPA (Advanced Research Projects Agency) - An agency of the United States Department of Defense, ARPA (Advanced Research Projects Agency) underwrote development for the precursor of the Internet, known as ARPANET.
  • Artificial Intelligence of Things (AIoT) - The Artificial Intelligence of Things (AIoT) is the combination of artificial intelligence (AI) technologies with the Internet of Things (IoT) infrastructure to achieve more efficient IoT operations, improve human-machine interactions and enhance data management and analytics.
  • AS1 (Applicability Statement 1) - AS1 (Applicability Statement is a specification for Electronic Data Interchange (EDI) communications between businesses using e-mail protocols.
  • AS2 (Applicability Statement 2) - AS2 (Applicability Statement 2) is a specification for Electronic Data Interchange (EDI) between businesses using the Internet's Web page protocol, the Hypertext Transfer Protocol (HTTP).
  • atomic clock (NIST-F1) - An atomic clock is the most accurate type of timepiece in the world, designed to measure time according to vibrations within atom s.
  • authentication, authorization, and accounting (AAA) - Authentication, authorization, and accounting (AAA) is a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • automatic repeat request (ARQ) - Automatic repeat request (ARQ) is a protocol for error control in data transmission.
  • autonomous system (AS) - On the Internet, an autonomous system (AS) is the unit of router policy, either a single network or a group of networks that is controlled by a common network administrator (or group of administrators) on behalf of a single administrative entity (such as a university, a business enterprise, or a business division).
  • AWS IoT Button - The AWS IoT Button is a programmable, Wi-Fi-enabled handheld device that allows developers to push a button to execute a variety of actions in the Amazon Web Services public cloud.
  • B-channel (bearer channel) - In the Integrated Services Digital Network (ISDN), the B-channel is the channel that carries the main data.
  • bandwidth test (testing your bandwidth) - A bandwidth test is a program that sends one or more files of known size over a network to a distant computer (for example, your own computer), measures the time required for the file(s) to successfully download at the destination, and thereby obtains a theoretical figure for the data speed between two or more points, usually in kilobits per second (Kbps) or megabits per second (Mbps).
  • Basic Rate Interface (BRI) - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bearer Independent Call Control (BICC) - Bearer Independent Call Control (BICC) is a signaling protocol based on N-ISUP that is used to support narrowband ISDN service over a broadband backbone network without interfering with interfaces to the existing network and end-to-end services.
  • BeeMe (MIT Media Lab) - BeeMe is a web-based social experiment that will be hosted by the MIT Media Lab at 11pm on October 31, 2018.
  • BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is a protocol that manages how packets are routed across the internet through the exchange of routing and reachability information between edge routers.
  • bis - The word (also used as a prefix or suffix) bis, applied to some modem protocol standards, is Old Latin for "repeat" (akin to Old High German "twice").
  • Bitcoin - Bitcoin is a digital currency (also called crypto-currency) that is not backed by any country's central bank or government.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • BitTorrent - BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points.
  • BlackBerry World - BlackBerry World is the official app store for BlackBerry smartphones and tablets.
  • blacksurfing - Blacksurfing is surfing the Web using an inverted palette, with white text on a black body.
  • blade server - A blade server is a thin, modular electronic circuit board containing one, two, or more microprocessors and memory, that is intended for a single, dedicated application (such as serving Web pages) and that can be easily inserted into a space-saving rack with many similar servers.
  • Blogger - Blogger is a free Web log service from Google that allows users to share text, photos and videos.
  • bookmark - Using a World Wide Web browser, a bookmark is a saved link to a Web page that has been added to a list of saved links.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that enables task-sharing in a distributed computing or grid computing environment.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • Broadband over Power Line (BPL) - Broadband over Power Line (BPL) is a technology that allows Internet data to be transmitted over utility power lines.
  • Broadband Technology Opportunities Program (BTOP) - The Broadband Technology Opportunities Program (BTOP) is an initiative within the American Recovery and Reinvestment Act (ARRA) created to promote the development and adoption of broadband throughout the United States, particularly in unserved and underserved areas.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • browserless Web - The browserless Web describes communication over the World Wide Web between programs rather than between people (with their Web browsers) and the server programs at Web sites.
  • build your own broadband (BYOB) - Build your own broadband (BYOB) is a community- or individual-driven initiative to lay foundations for high-speed internet, instead of the work being performed by a traditional internet service provider (ISP) or government.
  • business technology management (BTM) - Business technology management (BTM) is a term for a group of services intended to help businesses that might not have their own information technology (IT) department.
  • Business Transaction Protocol (BTP) - The Business Transaction Protocol (BTP) is an XML-based protocol being developed by the Business Transactions Technical Committee (BT TC) of the Organization for the Advancement of Structured Information Standards (OASIS) as a standardized Internet-based means of managing complex, ongoing business-to-business (B2B) transactions among multiple organizations.
  • BYE packet - A BYE (or Goodbye) packet is a type of Real-Time Transport Control Protocol (RTCP) packet that is sent when a participant in a multicast event leaves the session.
  • cable head-end - A cable head-end (or headend) is the facility at a local cable TV office that originates and communicates cable TV services and cable modem services to subscribers.
  • cache (computing) - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • canonical name - A canonical name is the properly denoted host name of a computer or network server.
  • canonicalization - In information technology, canonicalization (pronounced KA-nahn-nihk-uhl-ih-ZAY-shun and sometimes spelled canonicalisation) is the process of making something canonical -- that is, in conformance with some specification.
  • censorware - Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content.
  • Centrino - Centrino is a technology package from Intel that provides built-in wireless support for laptop computers while making it possible to run a laptop all day (up to seven hours) without a battery recharge.
  • CFML (ColdFusion Markup Language) - CFML (ColdFusion Markup Language) is a Web page markup language that allows a Web site developer to create pages with variable information (text or graphics) that is filled in dynamically (on the fly) in response to variables such as user input.
  • churn (agitation or turnover) - In a general context, churn is a synonym for agitation or turnover.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing) is a way to allocate Internet addresses more flexibly than the original system of Internet Protocol (IP) address classes allowed.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • Citrix XenMobile - Citrix XenMobile is mobile management software that provides mobile device management (MDM), mobile application management (MAM) and cloud file-sharing capabilities.
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clickstream analysis (clickstream analytics) - On a Web site, clickstream analysis is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clickthrough rate (CTR) - In banner advertising on a Web site, the clickthrough rate (CTR) is the percentage of times that viewers of a Web page click on a given banner ad.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • CoIP (communications over Internet Protocol) - CoIP (communications over Internet Protocol) is a set of standards defining the transmission of multimedia over the Internet.
  • ColdFusion - ColdFusion, a product from Macromedia, is a popular and sophisticated set of products for building Web sites and serving pages to users.
  • collaborative citizen journalism (CCJ) - Collaborative citizen journalism (CCJ), a concept made possible by the Internet and the advent of blogging, is the pooling of research and reporting by volunteers to develop journalistic news stories or to critically examine existing ones, especially stories from the mainstream media.
  • colocation (colo) - A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware.
  • colored coin - A colored coin is a denomination of a cryptocurrency, often Bitcoin, that is repurposed by marking it with metadata.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to ...

  • Security Operations Center (SOC)

    A security operations center (SOC) is a command center facility for a team of IT professionals with expertise in information ...

  • incident response team

    An incident response team is a group of IT professionals in charge of preparing for and reacting to any type of organizational ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • storage class memory (SCM)

    Storage class memory (SCM) is a type of NAND flash that includes a power source to ensure that data won't be lost due to a system...

  • Hadoop as a service (HaaS)

    Hadoop as a service (HaaS), also known as Hadoop in the cloud, is a big data analytics framework that stores and analyzes data in...

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

Close