Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

FIR - JTA

  • Firefox - Firefox is a Web browser that is smaller, faster, and in some ways more secure than the Netscape browser from which much of its code was derived.
  • firehose effect - A firehose effect occurs in a network when the source (transmitting) computer or terminal sends data too fast for a destination (receiving) computer or terminal to deal with it.
  • Flash cookie - Flash cookies, also known as local shared objects (LSO), are text files stored on a user’s hard drive when a browsers requests content that's supported by Adobe Flash.
  • for your information (FYI) - This term is included in our list of chat term and other chat acronyms.
  • Forward DNS lookup - Forward DNS lookup is using an Internet domain name to find an IP address.
  • frames (web site) - In creating a Web site, frames is the use of multiple, independently controllable sections on a Web presentation.
  • frictionless checkout - Frictionless checkout is a collection of technologies and processes used to make online and retail shopping faster and easier for consumers.
  • frictionless commerce - Frictionless commerce is a method of using data from devices, apps and websites to integrate buying opportunities as simply and seamlessly as possible into consumers’ everyday activities and natural environments.
  • FTP (File Transfer Protocol) - FTP (File Transfer Protocol) is a network protocol for transmitting files between computers over TCP/IP connections.
  • FUBAR - FUBAR is an acronym that originated in the military to stand for the words "f***ed up beyond all repair.
  • fully qualified domain name (FQDN) - A fully-qualified domain name (FQDN) is that portion of an Internet Uniform Resource Locator (URL) that fully identifies the server program that an Internet request is addressed to.
  • fuzzy search - A fuzzy search is a technique that uses search algorithms to find strings that match patterns approximately.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • gaming the system - Gaming the system is manipulation or exploitation of the rules designed to govern a given system in an attempt to gain an advantage over other users.
  • gateway - A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
  • geek - In computers and the Internet, a geek is a person who is inordinately dedicated to and involved with technology.
  • general-purpose computer - A general-purpose computer is one that, given the appropriate application and required time, should be able to perform most common computing tasks.
  • giant - In networks, a giant is a packet, frame, cell, or other transmission unit that is too large.
  • Gmail - Gmail (pronounced Gee-mail) is a free Web-based e-mail service that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages.
  • GMPLS (Generalized Multiprotocol Label Switching or Multiprotocol Lambda Switching) - GMPLS (Generalized Multiprotocol Label Switching) is a networking technology that enables fast and reliable network switching of data flows on any type of network infrastructure.
  • Google Adsense - Google AdSense is a program in which enterprises can display Google advertisements on Web sites and earn revenue from hits that generate traffic for the Google search engine s.
  • Google Analytics - Google Analytics is a free web analytics service that provides statistics and analytical tools for search engine optimization (SEO) and marketing purposes.
  • Google Chrome browser - Google Chrome browser is an open source program for accessing the World Wide Web and running Web-based applications.
  • Google Chrome OS - Google Chrome OS is an open source lightweight operating system (OS).
  • Google Hangouts - Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.
  • Google My Business - Google My Business is a free online business listing service that is integrated with the Google search engine.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google Voice - Google Voice allows registered members to link their mobile phones, IP telephony applications and land line phones to a single Google Voice phone number.
  • Google Wallet - Google Wallet is a mobile payment system developed by Google that allows smartphone users to store debit and credit card information for online and in-store purchases.
  • Googlebot - Googlebot is the web crawling software search bot (also known as a spider or webcrawler) that gathers the web page information used to supply Google search engine results pages (SERP).
  • Gopher - From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over the world to a viewer on your computer.
  • gov - gov is one of the top-level domain names that can be used when choosing a domain name.
  • Great Firewall of China - The Great Firewall of China is the name that western media has given to the combination of tools, services and rules that the government of the People's Republic of China uses to block certain internet content from those within China's borders.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • grok - To grok (pronounced GRAHK) something is to understand something so well that it is fully absorbed into oneself.
  • H.245 - H.245 is a protocol for the transmission of call management and control signals in packet-based networks using H.
  • hairpinning - In general telecommunication, hairpinning is returning a message from an origin endpoint back in the direction it came from as a way to get it to its destination endpoint.
  • HELLO packet - A HELLO packet is a special data packet (message) that is sent out periodically from a router to establish and confirm network adjacency relationships to other routers in the Open Shortest Path First (OSPF) communications protocol.
  • home page - For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer.
  • hop off - Hop off is a term used in telecommunications that refers to a point at which a signal or call leaves a network and moves to another network.
  • host (in computing) - A host (also known as "network host") is a computer or other device that communicates with other hosts on a network.
  • hosting (Web site hosting, Web hosting, and Webhosting) - Hosting (also known as Web site hosting, Web hosting, and Webhosting) is the business of housing, serving, and maintaining files for one or more Web sites.
  • HTML 4.0 - HTML 4.0 was the final version of the Hypertext Markup Language (HTML) before the Extensible Markup Language (XHTML) and remains the set of markup on which most large Web sites today are based.
  • HTML 5 desktop client - An HTML5 desktop client is a type of remote desktop client that provides an end user with access to a desktop or application through a web browser.
  • HTML validator - An HTML validator is a quality assurance program used to check Hypertext Markup Language (HTML) markup elements for syntax errors.
  • HTML5 - HTML 5 is a revision of the Hypertext Markup Language (HTML), the standard programming language for describing the contents and appearance of Web pages.
  • HTTP (Hypertext Transfer Protocol) - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • HTTP 1.1 - HTTP 1.1 is the latest version of Hypertext Transfer Protocol (HTTP), the World Wide Web application protocol that runs on top of the Internet's TCP/IP suite of protocols.
  • hypertext - Hypertext is the organization of information units into connected associations that a user can choose to make.
  • Hypertext Transfer Protocol daemon (HTTPD) - On the Web, each server has an HTTPD or Hypertext Transfer Protocol daemon that waits in attendance for requests to come in from the rest of the Web.
  • Hypertext Transfer Protocol Secure (HTTPS) - Hypertext Transfer Protocol Secure (HTTPS) is a protocol that secures communication and data transfer between a user's web browser and a website.
  • iBeacon - iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
  • IBM Roadrunner - Roadrunner is the fastest supercomputer in the world, twice as fast as Blue Gene and six times as fast as any of the other current supercomputers.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IEEE 802 wireless standards - The IEEE 802 standard is a collection of networking standards that cover the physical and data-link layer specifications for technologies such as Ethernet and wireless.
  • image content search - Image content search is the capacity for software to recognize objects in digital images and return a search engine results page (SERP) based on a user query.
  • image recognition - Image recognition, in the context of machine vision, is the ability of software to identify objects, places, people, writing and actions in images.
  • impression - In Web advertising, the term impression is sometimes used as a synonym for view, as in ad view.
  • inbound link - An inbound link (also referred to as a back link) is a hyperlink on a third-party web page that points to a web page on �your site.
  • initialism - An initialism is an abbreviation formed from the first letter -- the initial -- of each of the words in a term.
  • inline frame (iframe) - An inline frame (iframe) is a HTML element that loads another HTML page within the document.
  • Instagram - Instagram is a free, online photo-sharing application and social network platform that was acquired by Facebook in 2012.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a standalone application or embedded software.
  • instruction set - An instruction set is a group of commands for a central processing unit (CPU) in machine language.
  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • Intel 80386 - Intel 80386 also known as (386 and i386) is the third-generation Intel x86 microprocessor introduced in October 1985.
  • interactive video - Interactive video (IV) is a multimedia recording that can take user input to perform some action.
  • Interactive Voice Response (IVR) - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
  • interactivity - In computers, interactivity is the dialog that occurs between a human being (or possibly another live creature) and a computer program.
  • Internet - The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers).
  • Internet Information Services (IIS) - Internet Information Services (IIS) is a flexible, general-purpose web server from Microsoft that runs on Windows systems to serve requested HTML pages or files.
  • internet meme - An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time.
  • internet metering - Internet metering is a service model in which an internet service provider (ISP) keeps track of bandwidth use and charges users accordingly.
  • Internet Movie Database (IMDb) - The Internet Movie Database (IMDb) is an online database that provides information to consumers about movies, TV and film industry professionals.
  • Internet of Vehicles (IoV) - The Internet of Vehicles (IoV) is a distributed network that supports the use of data created by connected cars and vehicular ad hoc networks (VANETs).
  • Internet Protocol (IP) - The Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another on the internet.
  • Internet shill - An Internet shill is someone who promotes something or someone online for pay without divulging that they are associated with the entity they shill for.
  • Internet TV - Internet TV (ITV) is generally-available content distributed over the Internet.
  • intranet - An intranet is a private network contained within an enterprise that is used to securely share company information and computing resources among employees.
  • IOTA - IOTA is a distributed ledger technology for IoT devices that will facilitate machine to machine (M2M) transactions in the M2M economy.
  • IP address (Internet Protocol Address) - This definition is based on Internet Protocol Version 4.
  • IP PBX (private branch exchange) - An IP PBX is a private branch exchange (telephone switching system within an enterprise) that switches calls between VoIP (voice over Internet Protocol or IP) users on local lines while allowing all users to share a certain number of external phone lines.
  • IP telephony (Internet Protocol telephony) - IP telephony (Internet Protocol telephony) is a general term for technologies, products and services that use the Internet Protocol's packet-switched connections to support voice calling, voicemail, video calling, video conferencing, faxing and instant messaging.
  • iPad - The iPad is a touchscreen tablet PC made by Apple.
  • iptables - Iptables is a generic table structure that defines rules and commands as part of the netfilter framework that facilitates Network Address Translation (NAT), packet filtering, and packet mangling in the Linux 2.
  • IPv6 address - An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
  • IRL (in real life) - IRL (in real life) is an abbreviation used to explain when person is speaking about something real and outside the digital world of communication, gaming or virtual reality.
  • ISA Server - Microsoft's ISA Server (Internet Security and Acceleration Server) was the successor to Microsoft's Proxy Server 2.
  • iSCSI (Internet Small Computer System Interface) - ISCSI is a transport layer protocol that describes how Small Computer System Interface (SCSI) packets should be transported over a TCP/IP network.
  • IT distributor - An IT channel distributor is a business that acts as an intermediary between vendors and value-added resellers (VARs) or system integrators (SIs) in the distribution of software or hardware.
  • IT reseller - An IT reseller is an intermediary entity in the distribution channel that purchases software and/or hardware from the manufacturer or some other entity, such as a wholesaler or a distributor, and sells it to consumers.
  • Java Card - Java Card is an open standard from Sun Microsystems for a smart card development platform.
  • Java Server Page (JSP) - Java Server Page (JSP) is a technology for controlling the content or appearance of Web pages through the use of servlets, small programs that are specified in the Web page and run on the Web server to modify the Web page before it is sent to the user who requested it.
  • JavaScript hijacking - JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML).
  • join.me - Join.me is an online meeting and screen-sharing application by LogMeIn.
  • JRun - JRun is an application server from Macromedia that is based on Sun Microsystems' Java 2 Platform, Enterprise Edition (J2EE).
  • JSON (Javascript Object Notation) - JSON (JS Object Notation) is a text-based, human-readable data interchange format used for representing simple data structures and objects in Web browser-based code.
  • JTAPI (Java Telephony Application Programming Interface) - JTAPI (Java Telephony Application Programming Interface) is a Java-based application programming interface (API) for computer telephony applications.
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • Domain-based Message Authentication, Reporting and Conformance (DMARC)

    The Domain-based Message Authentication, Reporting and Conformance (DMARC) protocol is one leg of the tripod of internet ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed or disclosed in an...

  • insider threat

    An insider threat is a category of risk posed by those who have access to an organization's physical or digital assets.

SearchCIO
  • data privacy (information privacy)

    Data privacy, also called information privacy, is an aspect of data protection that addresses the proper storage, access, ...

  • leadership skills

    Leadership skills are the strengths and abilities individuals demonstrate that help to oversee processes, guide initiatives and ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

SearchHRSoftware
SearchCustomerExperience
  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

  • recommerce

    Recommerce is the selling of previously owned items through online marketplaces to buyers who reuse, recycle or resell them.

  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

Close