Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

NET - ROU

  • netfilter - Netfilter is a utility in Linux 2.
  • Netfinity - IBM's Netfinity is an Intel-based enterprise server line that is based on IBM's X-architecture.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • Netscape Server Application Programming Interface (NSAPI) - NSAPI (Netscape Server Application Programming Interface) is an (application program interface) that is provided with Netscape Web server to help developers build faster and more complex Web-based applications by extending the server capabilities.
  • network access server (NAS) - A network access server (NAS) is a computer server that enables an independent service provider (ISP) to provide connected customers with Internet access.
  • network service provider (NSP) - A network service provider (NSP) is a company that owns, operates and sells access to internet backbone infrastructure and services.
  • network slicing - Network slicing is the separation of multiple virtual networks that operate on the same physical hardware for different applications, services or purposes.
  • network-attached storage (NAS) - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • NewsML - Based on the Extensible Markup Language (XML), NewsML is a standard way to describe news information content so that it can distributed and reused widely on Web sites and other media.
  • NIC handle (Network Information Center handle) - A NIC (Network Information Center) handle is an alphanumeric character sequence that is unique for each entry in the database of all Internet domain name registrants.
  • Ning - Ning iNing is an web-based social network platform that allows an organization to build customized social websites and interactive virtual communities.
  • NNTP (Network News Transfer Protocol) - NNTP (Network News Transfer Protocol) is the predominant protocol used by computer clients and servers for managing the notes posted on Usenet newsgroups.
  • nomadicity - Nomadicity is the tendency of a person, or group of people, to move with relative frequency.
  • non-virtual hosting - Non-virtual hosting is offering to host a Web site for an Internet user or company within the same domain name as that of the service provider.
  • NSFNET - NSFNET was a network for research computing deployed in the mid-1980s that in time also became the first backbone infrastructure for the commercial public Internet.
  • OAuth - OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.
  • Object Request Broker (ORB) - Also see ORBS, a term easily confused with ORB.
  • Open Directory Project (ODP) - The Open Directory Project (ODP) is a human-edited index of Web sites.
  • open relay (insecure relay or a third-party relay) - An open relay (sometimes called an insecure relay or a third-party relay) is an SMTP e-mail server that allows third-party relay of e-mail messages.
  • Optivity Telephony Manager (OTM) - Optivity Telephony Manager (OTM) is an application that provides single-point analysis, configuration, and management of telephony networks using a Web browser or graphical user interface (GUI).
  • ORBS (Open Relay Behavior-modification System) - A similar but unrelated term is ORB (Object Request Broker).
  • org - "org" is one of the generic top-level domain names that can be used when choosing a domain name.
  • Our Favorite Technology Blogs - A comprehensive listing of information technology-related blogs selected by the editors of WhatIs.
  • packet mangling - Packet mangling is the modification of packets at a packet-based network interface before and/or after routing.
  • Packet Order Correction (POC) - Packet Order Correction (POC) is a technique for dealing with out-of-order packet delivery.
  • packet-switched - Packet-switched describes the type of network in which relatively small units of data called packets are routed through a network based on the destination address contained within each packet.
  • PAIR (Policy Analysis of Internet Routing) - The Policy Analysis of Internet Routing (PAIR) project is a Merit Network initiative dedicated to developing tools that Internet service providers (ISPs), network operators, and end users can use to troubleshoot Internet routing and policy problems.
  • payment gateway - A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information.
  • PayPal - PayPal is a Web-based application for the secure transfer of funds between member accounts.
  • PEAP (Protected Extensible Authentication Protocol) - PEAP (Protected Extensible Authentication Protocol) is a version of EAP, the authentication protocol used in wireless networks and Point-to-Point connections.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • peering - Peering is the arrangement of traffic exchange between Internet service providers (ISPs).
  • Perl - Perl is a family of script programming languages that are similar in syntax to the C language, including Perl 5 and Perl 6.
  • Permission Marketing - Permission marketing is an approach to selling goods and services in which a prospect explicitly agrees in advance to receive marketing information.
  • persistent identification element (PIE) - Persistent identification element (PIE) is used to tag individual user’s browsers with a unique identifier that – unlike ordinary HTTP cookies -- cannot be easily deleted.
  • personal video recorder (PVR) - A personal video recorder (PVR) is an interactive TV recording device, in essence a sophisticated set-top box with recording capability (although it is not necessarily kept on top of the television set).
  • personalization - On a Web site, personalization is the process of tailoring pages to individual users' characteristics or preferences.
  • phantom page - A phantom page is a Web page that is optimized for search engines rather than for humans.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.
  • phtml suffix (PHP) - A PHTML (or it's sometimes called a PHP) page is a Web page that includes a script written in PHP, a language comparable to JavaScript or Microsoft's VBScript.
  • ping - Ping is a basic Internet program that allows a user to verify that a particular IP address exists and can accept requests.
  • ping storm - A ping storm is a condition in which the Internet ping program is used to send a flood of packets to a server to test its ability to handle a high amount of traffic or, maliciously, to make the server inoperable.
  • PLATO (Programmed Logic for Automatic Teaching Operations) - PLATO (Programmed Logic for Automatic Teaching Operations), a computer-based training (CBT) network developed in the 1960s, is often credited as the earliest example of a virtual community.
  • PMML (Predictive Model Markup Language) - PMML (Predictive Model Markup Language) is an XML-based language that enables the definition and sharing of predictive models between applications.
  • point-of-presence (POP) - On the Internet, a point-of-presence (POP) is an access point from one place to the rest of the Internet.
  • Point-to-Point Tunneling Protocol (PPTP) - Point-to-Point Tunneling Protocol (PPTP) is a protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.
  • Pokémon GO - Pokémon GO is a mobile augmented reality (AR) version of the popular Pokémon video game for iPhone or Android systems.
  • pop-under - On the Web, a pop-under is a window that is created but temporarily "hidden" behind the window of a Web site that the user has chosen to visit.
  • pop-up - A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface.
  • pop-up ad - A pop-up ad is a pop-up window used for advertising.
  • port 80 - On a Web server or Hypertext Transfer Protocol daemon, port 80 is the port that the server "listens to" or expects to receive from a Web client, assuming that the default was taken when the server was configured or set up.
  • port number - A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • Portal Markup Language (PML) - Portal Markup Language (PML), an application of the Extensible Markup Language (XML), describes the characteristics of a product that is used to create a portal Web site (sometimes referred to as an enterprise information portal).
  • portal software - Portal software is a type of development tool used to create a portal (starting point) on a company's intranet so that employees can find a centralized starting place for access to consolidated enterprise-related functions, such as e-mail, customer relationship management (CRM) tools, company information, workgroup systems, and other applications.
  • presence leveraging - Presence leveraging refers to any technology that supports and expands presence, the ability of a network subscriber to locate and identify any other user's computing device as soon as the other user connects to the network.
  • presence technology - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
  • Primary Rate Interface (PRI) - In the Integrated Services Digital Network (ISDN), there are two levels of service: the Basic Rate Interface (BRI), intended for the home and small enterprise, and the Primary Rate Interface (PRI), for larger users.
  • Prism - Prism is an application that lets users run web applications in dedicated browser windows.
  • progressive download - A progressive download is a process that allows the user to access content before the data transfer is complete.
  • Project Owl - Project Owl is an endeavor by Google to try to reduce the amount of fake news and hate speech from showing in its search results.
  • pure play - Pure play is a business term used to indicate a company, business model or investment focused on a particular industry, product, service or line of distribution.
  • Q signaling (QSIG) - Q signaling (abbreviated QSIG), a protocol for Integrated Services Digital Network (ISDN) communications based on the Q.
  • Q.931 - Q.931 (also called Q93 is a signaling protocol for Integrated Services Digital Network (ISDN) communications that is used in voice over IP (VoIP).
  • Qik - Qik is an online video streaming service that allows anyone with a strong wireless Internet connection and a video camera-equipped smartphone to broadcast live events.
  • quad - A quad (pronounced KWAHD) is a unit in a set of something that comes in four units.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • QuickPlace - QuickPlace is Lotus's Web-based shared workspace software for real time collaboration among geographically dispersed participants.
  • Quiz: Web Management Basics - How to take the quiz: - After reading the question, click on the answer that you think is correct to go to the whatis definition.
  • Qzone - Qzone is a Chinese social networking site and blogging platform for self-expression and content sharing.
  • R-value - R-value is a number, or score, that is used to quantitatively express the subjective quality of speech in communications systems, especially digital networks that carry voice over IP (VoIP) traffic, or for which VoIP service is under consideration.
  • Real-Time Transport Protocol (RTP) - The Real-Time Transport Protocol (RTP) is an Internet protocol standard that specifies a way for programs to manage the real-time transmission of multimedia data over either unicast or multicast network services.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • redirection - On a Web site, redirection is a technique for moving visitors to a different Web page than the one they request, usually because the page requested is unavailable.
  • Regional Internet Registry (RIR) - A Regional Internet Registry (RIR) is a not-for-profit organization that oversees Internet Protocol (IP) address space and the Autonomous System (AS) numbers within a specific geographical region.
  • registered port numbers - The registered port numbers are the port numbers that companies and other users register with the Internet Corporation for Assigned Names and Numbers (ICANN) for use by the applications that communicate using the Internet's Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP).
  • registration, admission, and status (RAS) - Registration, admission, and status (RAS) is a component of a network protocol that involves the addition of (or refusal to add) new authorized users, the admission of (or refusal to admit) authorized users based on available bandwidth, and the tracking of the status of all users.
  • registry - In the Microsoft Windows operating systems beginning with Windows 95, the registry is a single place for keeping such information as what hardware is attached, what system options have been selected, how computer memory is set up, and what application programs are to be present when the operating system is started.
  • remote desktop - Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • Remote Procedure Call (RPC) - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.
  • remote wakeup (RWU) - Remote wakeup (RWU) is a general term for the powering-up of (turning on) a computer over a network.
  • Request for Comments (RFC) - RFC is also an abbreviation for Remote Function Call.
  • reseller hosting - Reseller hosting is the provision of Web hosting services to companies that in turn act as Web hosts for other companies, typically providing Web site design and management services as well as acting as host for the site and serving its pages to users.
  • Resilient Packet Ring (RPR) - Resilient Packet Ring (RPR) is a network topology being developed as a new standard for fiber optic rings.
  • respawning cookie - A respawning cookie is a standard HTTP cookie backed up by data stored in additional files that are used to rebuild the original cookie when the user visits the originating site again.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • reverse Telnet (direct Telnet) - Reverse Telnet (sometimes called direct Telnet) is the initiation of a Telnet session from a computer system to one of its remote users.
  • RFM analysis (recency, frequency, monetary) - RFM (recency, frequency, monetary) analysis is a marketing technique used to determine which customers are the best ones by examining how often a customer buys (recency), how long it's been since their last purchase (frequency), and.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • RIFAN 2 - Reseau Internet de la Force Aeronavale etape 2 (RIFAN 2) is a secure internet developed for military applications.
  • Rijndael - Rijndael (pronounced rain-dahl) is the algorithm that has been selected by the U.
  • RIOT operating system - RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
  • Ripple - Ripple is a payment protocol, cryptocurrency creator and high-tech payment firm that uses blockchain technology to help banks conduct fast global financial settlements.
  • robots.txt - Robots.txt is a text file used on websites to provide instructions to webcrawlers or “robots” that index pages for search engines.
  • root server system - On the Internet, the root server system is the way that an authoritative master list of all top-level domain names (such as com, net, org,and individual country codes) is maintained and made available to all routers.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close