Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

MON - REM

  • Monster Worldwide - Monster Worldwide is an online recruiting company that connects applicants with employers.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • MOSPF (Multicast Open Shortest Path First) - MOSPF (Multicast Open Shortest Path First) is an extension to the OSPF (Open Shortest Path First) protocol that facilitates interoperation between unicast and multicast routers.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • mrouter (multicast router) - An mrouter, or multicast router, is a router program that distinguishes between multicast and unicast packets and determines how they should be distributed along the Multicast Internet (sometimes known as the Multicast Backbone or MBone).
  • multicast - Multicast is communication between a single sender and multiple receivers on a network.
  • Multicast Dissemination Protocol (MDP) - The Multicast Dissemination Protocol (MDP) is a communications protocol for one-to-many transmissions in wired or wireless networks.
  • multihomed - Multihomed describes a computer host that has multiple IP addresses to connected networks.
  • Multimedia Home Platform (MHP) - Multimedia Home Platform (MHP) is a digital video broadcasting (DVB) standard intended to combine digital television (DTV) with the Internet and the World Wide Web.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.
  • munging - Munging is the deliberate alteration of an e-mail address on a Web page to hide the address from spambot programs that scour the Internet for e-mail addresses.
  • N1 - N1 is Sun Microsystems' strategy for making a network environment as easy to manage as a single machine.
  • namespace - In general, a namespace uniquely identifies a set of names so that there is no ambiguity when objects having different origins but the same names are mixed together.
  • National Electronic Disease Surveillance System (NEDSS) - The National Electronic Disease Surveillance System (NEDSS) is a secure online framework that allows healthcare professionals and government agencies to communicate about disease patterns and coordinate national response to outbreaks.
  • NBMA (non-broadcast multiple access) - NBMA (non-broadcast multiple access) is one of four network types in the OSPF (Open Shortest Path First) communications protocol.
  • netfilter - Netfilter is a utility in Linux 2.
  • Netfinity - IBM's Netfinity is an Intel-based enterprise server line that is based on IBM's X-architecture.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • Netscape Server Application Programming Interface (NSAPI) - NSAPI (Netscape Server Application Programming Interface) is an (application program interface) that is provided with Netscape Web server to help developers build faster and more complex Web-based applications by extending the server capabilities.
  • network access server (NAS) - A network access server (NAS) is a computer server that enables an independent service provider (ISP) to provide connected customers with Internet access.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing is the separation of multiple virtual networks that operate on the same physical hardware for different applications, services or purposes.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • NewsML - Based on the Extensible Markup Language (XML), NewsML is a standard way to describe news information content so that it can distributed and reused widely on Web sites and other media.
  • NIC handle (Network Information Center handle) - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • NNTP (Network News Transfer Protocol) - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • nomadicity - Nomadicity is the tendency of a person, or group of people, to move with relative frequency.
  • non-virtual hosting - Non-virtual hosting is offering to host a Web site for an Internet user or company within the same domain name as that of the service provider.
  • NSFNET - NSFNET was a network for research computing deployed in the mid-1980s that in time also became the first backbone infrastructure for the commercial public Internet.
  • OAuth - OAuth (Open Authorization) is an open protocol for token-based authentication and authorization on the Internet.
  • Object Request Broker (ORB) - Also see ORBS, a term easily confused with ORB.
  • Open Directory Project (ODP) - The Open Directory Project (ODP) is a human-edited index of Web sites.
  • open relay (insecure relay or a third-party relay) - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • Optivity Telephony Manager (OTM) - Optivity Telephony Manager (OTM) is an application that provides single-point analysis, configuration, and management of telephony networks using a Web browser or graphical user interface (GUI).
  • ORBS (Open Relay Behavior-modification System) - A similar but unrelated term is ORB (Object Request Broker).
  • org - "org" is one of the generic top-level domain names that can be used when choosing a domain name.
  • Our Favorite Technology Blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
  • packet mangling - Packet mangling is the modification of packets at a packet-based network interface before and/or after routing.
  • Packet Order Correction (POC) - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • packet-switched - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
  • PAIR (Policy Analysis of Internet Routing) - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • PatriotGrid - PatriotGrid is a group of distributed computing projects whose goal is to identify new leads for vaccines or cures for agents known to be potential bioterrorism weapons.
  • payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.
  • PayPal - PayPal is a Web-based application for the secure transfer of funds between member accounts.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peering - Peering is the arrangement of traffic exchange between Internet service providers (ISPs).
  • Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.
  • Permission Marketing - Permission marketing is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personalization - On a Web site, personalization is the process of tailoring pages to individual users' characteristics or preferences.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
  • phtml suffix (PHP) - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.
  • ping - Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.
  • ping storm - A ping storm is a condition in which the Internet ping program is used to send a flood of packets to a server to test its ability to handle a high amount of traffic or, maliciously, to make the server inoperable.
  • PLATO (Programmed Logic for Automatic Teaching Operations) - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.
  • PMML (Predictive Model Markup Language) - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.
  • point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • Point-to-Point Tunneling Protocol (PPTP) - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up ad - A pop-up ad is a pop-up window used for advertising.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • port number - A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • Portal Markup Language (PML) - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).
  • portal software - Portal software is a type of development tool used to create a portal (starting point) on a company's intranet so that employees can find a centralized starting place for access to consolidated enterprise-related functions, such as e-mail, customer relationship management (CRM) tools, company information, workgroup systems, and other applications.
  • presence leveraging - Presence leveraging refers to any technology that supports and expands presence, the ability of a network subscriber to locate and identify any other user's computing device as soon as the other user connects to the network.
  • presence technology - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
  • Primary Rate Interface (PRI) - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • progressive download - A progressive download is a process that allows the user to access content before the data transfer is complete.
  • Project Owl - Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.
  • pure play - Pure play is a business term used to indicate a company, business model or investment focused on a particular industry, product, service or line of distribution.
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • Qik - Qik is an online video streaming service that allows anyone with a strong wireless Internet connection and a video camera-equipped smartphone to broadcast live events.
  • quad - A quad (pronounced KWAHD) is a unit in a set of something that comes in four units.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • QuickPlace - QuickPlace is Lotus's Web-based shared workspace software for real time collaboration among geographically dispersed participants.
  • Quiz: Web Management Basics - How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis definition.
  • Qzone - Qzone is a Chinese social networking site and blogging platform for self-expression and content sharing.
  • R-value - R-value is a number, or score, that is used to quantitatively express the subjective quality of speech in communications systems, especially digital networks that carry voice over IP (VoIP) traffic, or for which VoIP service is under consideration.
  • Real-Time Transport Protocol (RTP) - The Real-Time Transport Protocol (RTP) is an Internet protocol standard that specifies a way for programs to manage the real-time transmission of multimedia data over either unicast or multicast network services.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Regional Internet Registry (RIR) - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close