Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

RIC - WEB

  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • RIFAN 2 - Reseau Internet de la Force Aeronavale etape 2 (RIFAN 2) is a secure internet developed for military applications.
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
  • Ripple - Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.
  • robots.txt - Robots.txt is a text file used on websites to provide instructions to webcrawlers or “robots” that index pages for search engines.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that is used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • RSVP (Resource Reservation Protocol) - RSVP (Resource Reservation Protocol) is a set of communication rules that allows channels or paths on the Internet to be reserved for the multicast (one source to many receivers) transmission of video and other high-bandwidth messages.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • Scratch - Scratch is a free object-oriented software development kit (SDK) that allows children age 8-16 to create animations, interactive stories, games and music without needing to know a specific programming language.
  • screen name - In a computer network, a screen name is the name a user chooses to use when communicating with others online.
  • screencast - A screencast is a digital video recording that captures actions taking place on a computer desktop.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • server space provider - A server space provider is an individual, company, or organization that provides storage space on a server for Web pages, usually for a charge.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • service-oriented architecture (SOA) - Service-oriented architecture (SOA) is a software development model that allows services to communicate across different platforms and languages to form applications.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • shoppable video - A shoppable video is a multimedia recording that allows a user to initiate an order from within the video.
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • slivercasting (narrowcasting) - Slivercasing, or narrowcasting, is the transmission of video programming to a niche audience, often through relatively inexpensive means like streaming video over high-speed connections.
  • smart grid sensor - A smart grid sensor is a small, lightweight node that serves as a detection station in a sensor network.
  • smart home or building (home automation or domotics) - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart lock - A smart lock is an electronic and mechanical locking device that opens wirelessly with an authorized users’ authentication.
  • smart meter - A smart meter is an Internet-capable device that measures energy, water or natural gas consumption of a building or home.
  • smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
  • smart TV - A smart TV is a digital television that is, essentially, an Internet-connected, storage-aware computer specialized for entertainment.
  • Snapchat - Snapchat is a mobile app that allows users to send and receive 'self-destructing' photos and videos.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol), which is based in Extensible Markup Language (XML), facilitates communication between application and operating systems.
  • Social media management software (SMMS) - Social media management software (SMMS) is a tool that allows organizations to monitor and analyze online conversations from different communication channels.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • social network - A social network, in technology parlance, is a website or other application where people, often of similar interests, come together to communicate with each other and share information including photos, videos, audio and written messages.
  • social recruiting (social media recruitment) - Social media recruiting is the enterprise use of social media platforms to identify, engage and vet individuals the organization may want to hire.
  • social search engine - A social search engine is an enhanced version of a search engine that combines traditional algorithm -driven technology with online community filtering to produce highly personalized results.
  • social shopping - Social shopping is a type of e-commerce that seeks to involve people with similar tastes in an online shopping experience.
  • socks - Socks (or "SOCKS") is a protocol that a proxy server can use to accept requests from client users in a company's network so that it can forward them across the Internet.
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • spider - A spider is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • sping (spam ping) - A sping (for spam ping) is a ping sent from a splog (spam blog) to make recipients think content of interest has been updated although that may not be the case.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • stack - TCP/IP is frequently referred to as a "stack.
  • start of authority record - A start of authority (SOA) record is information stored in a domain name system (DNS) zone about that zone and about other DNS records.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • static URL - A static uniform resource locator (URL) is a name-based website address that is direct, unchanging, clear and contains no session or user identification information.
  • stop word - In computer search engines, a stop word is a commonly used word (such as "the") that a search engine has been programmed to ignore, both when indexing entries for searching and when retrieving them as the result of a search query.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • style sheet - A term extended from print publishing to online media, a style sheet is a definition of a document's appearance in terms of such elements as: The default typeface, size, and color for headings and body text How front matter (preface, figure list, title page, and so forth) should look How all or individual sections should be laid out in terms of space (for example, two newspaper columns, one column with headings having hanging heads, and so forth).
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • supercomputer - The first commercially successful supercomputer, the CDC (Control Data Corporation) 6600 was designed by Seymour Cray.
  • SYN flood (half open attack) - SYN flooding is a method that the user of a hostile client program can use to conduct a denial-of-service (DoS) attack on a computer server.
  • T-carrier system - To see the relationship between T-carrier, E-carrier, and DS0 multiples, see digital signal X.
  • T1 (T-1) - Also see the T-carrier system, of which the T1 is a part.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • third-party cookie - A third-party cookie is a cookie that is placed on a user's hard disk by a website from a domain other than the one a user is visiting.
  • THREAD protocol - The THREAD protocol is a home automation device communication method owned by Nest, a subsidiary of Google.
  • three-phase commit (3PC) - Three-phase commit (3PC) is a protocol that consists of a distributed algorithm used to ensure all transactions in a system are agreed upon and are committed to.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
  • timeline - A timeline is the presentation of a chronological sequence of events along a drawn line that enables a viewer to understand temporal relationships quickly.
  • Tomcat - Tomcat is an application server from the Apache Software Foundation that executes Java servlets and renders Web pages that include Java Server Page coding.
  • Top 10 Spyware Threats - Visit our spyware feature page to learn more about this problem and how SMBs can beat it.
  • traceroute - Traceroute is a utility that records the route (the specific gateway computers at each hop) through the Internet between your computer and a specified destination computer.
  • tree network - In telecommunication networks, a tree network is a combination of two or more star networks connected together.
  • Trivial File Transfer Protocol (TFTP) - Trivial File Transfer Protocol (TFTP) is an Internet software utility for transferring files that is simpler to use than the File Transfer Protocol (FTP) but less capable.
  • Tumblr - Tumblr is a free microblogging site.
  • TV operating system - A TV operating system (TV OS) is the bootable software in smart TVs and set top boxes that allows a user to control and access to a smart TV’s advanced features and connected devices through a graphical user interface (GUI).
  • Twitch - Twitch (Twitch.
  • UDDI (Universal Description, Discovery, and Integration) - UDDI (Universal Description, Discovery, and Integration) is an XML-based registry for businesses worldwide to list themselves on the Internet.
  • Uniform Resource Identifier (URI) - A Uniform Resource Identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
  • Universal Business Language (UBL) - Universal Business Language (UBL) is a royalty-free set of documents based on the ebXML (Electronic Business XML) Core Components Technical Specification, also known as ISO 15000-5.
  • Universal Naming Convention (UNC) - In a network, the Universal Naming Convention (UNC) is a way to identify a shared file in a computer without having to specify (or know) the storage device it is on.
  • URL (Uniform Resource Locator) - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the Internet.
  • URN (Uniform Resource Name) - A URN (Uniform Resource Name) is an Internet resource with a name that, unlike a URL, has persistent significance - that is, the owner of the URN can expect that someone else (or a program) will always be able to find the resource.
  • usability - Also see human-computer interaction and graphical user interface.
  • User Datagram Protocol (UDP) - User Datagram Protocol (UDP) is a communications protocol that is primarily used to establish low-latency and loss-tolerating connections between applications on the internet.
  • User Principal Name (UPN) - In the Windows operating system's Active Directory, a User Principal Name (UPN) is the name of a system user in an e-mail address format.
  • user session (visit) - In tabulating statistics for Web site usage, a user session (sometime referred to as a visit) is the presence of a user with a specific IP address who has not visited the site recently (typically, anytime within the past 30 minutes).
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • UTF-16 (16- bit Unicode Transformation Format) - UTF-16 (16- bit Unicode Transformation Format) is a standard method of encoding Unicode character data.
  • UUID (Universal Unique Identifier) - A UUID (Universal Unique Identifier) is a 128-bit value used to uniquely identify an object or entity on the internet.
  • vertical search engine - A vertical search engine is a search engine that is dedicated to a particular area of focus.
  • video resume - A video resume is a brief account of a job applicant's professional experience, qualifications and interests, submitted to a prospective employer in video form.
  • Vimeo - Vimeo is a U.
  • Vint Cerf (Vinton Gray Cerf) - Vint Cerf (Vinton Gray Cerf) is an American computer scientist best known as an Internet pioneer.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual hosting - On the Internet, virtual hosting is the provision of Web server hosting services so that a company (or individual) doesn't have to purchase and maintain its own Web server and connections to the Internet.
  • virtual meeting room - A virtual meeting room is a cloud-based collaboration space that allows people in disparate geographical locations to meet in real time.
  • Visual Studio .NET - Visual Studio .
  • VoIP phone - A VoIP phone is a hardware- or software-based telephone designed to use voice over Internet Protocol (VoIP) technology to send and receive phone calls over an IP network.
  • VoIP trunk gateway - A VoIP trunk gateway is an interface that facilitates the use of plain old telephone service (POTS) equipment, such as conventional phone sets and fax machines, with a voice over IP (VoIP) network.
  • wallet - A wallet is a small software program used for online purchase transactions.
  • WAN (wide area network) - A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close