Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

WIN - ZOP

  • Windows Internet Naming Service (WINS) - Windows Internet Naming Service (WINS), part of the Microsoft Windows NT and 2000 Servers, manages the association of workstation names and locations with Internet Protocol addresses (IP addresses) without the user or an administrator having to be involved in each configuration change.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.
  • Winsock - Winsock is a programming interface and the supporting program that handles input/output requests for Internet applications in a Windows operating system.
  • Winsock 2 - Like Winsock, Winsock 2 is a programming interface and the supporting program that handles input/output requests for Internet applications in a Windows operating system.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • wireless broadband (WiBB) - Wireless broadband is high-speed Internet and data service delivered through a wireless local area network (WLAN) or wide area network (WWAN).
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.
  • wireless Web - The wireless Web refers to use of the World Wide Web through a wireless device, such as a cellular telephone or personal digital assistant (PDA).
  • WordPress - WordPress is free, open source publishing software that can be installed locally on a web server and viewed on a proprietary web site or hosted in the cloud and viewed on the WordPress web site.
  • workaround - A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn't working.
  • workplace (user interface) - In a computer user interface, a workplace is a personalized view of a company and its processes that builds on the popular desktop metaphor.
  • World Wide Web (WWW) - The World Wide Web is the combination of all resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP).
  • WS-Coordination (Web Services Coordination) - WS-Coordination (Web Services Coordination) is a proposed IT industry standard for how individual Web services can interact in order to accomplish an application task.
  • WS-I Organization (Web Services Interoperability) - The WS-I (Web Services Interoperability) Organization is an association of IT industry companies, including IBM and Microsoft, that aim to create Web services specifications that all companies can use.
  • WS-Security (Web Services Security) - WS-Security (Web Services Security) is a proposed IT industry standard that addresses security when data is exchanged as part of a Web service.
  • WS-Transaction - WS-Transaction is one of a series of specifications from an industry group that includes IBM, Microsoft, and BEA Systems.
  • WSTx (Web Services Transactions) - WSTx (Web Services Transaction) is a set of XML markup specifications designed to permit the use of open, standard protocols for secure, reliable transactions across the Web.
  • X - X# is the name that has been given to a "data-centric" programming language that Microsoft is said to be developing in order to make it easier for a programmer to specify XML-defined data and how it should be handled by the program.
  • XACML (Extensible Access Control Markup Language) - XACML (Extensible Access Control Markup Language) is an open standard XML-based language designed to express security policies and access rights to information for Web services, digital rights management (DRM), and enterprise security applications.
  • Xalan - Xalan is a specification for transforming Extensible Markup Language (XML) documents into Hypertext Markup Language (HTML) or other XML document types.
  • XDMA (Xing Distributed Media Architecture) - XDMA (Xing Distributed Media Architecture) is a network architecture for multicast streaming media transmissions.
  • Xerces - Xerces (the name comes from the Xerces blue butterfly) is a set of parsers compatible with Extensible Markup Language (XML).
  • XHTML (Extensible Hypertext Markup Language) - As the World Wide Web Consortium (W3C) describes it, XHTML (Extensible Hypertext Markup Language) is "a reformulation of HTML 4.
  • XING - XING is a European social networking website for business professionals.
  • XML (Extensible Markup Language) - Extensible Markup Language (XML) is a text-based format that allows for the structuring of electronic documents and is not limited to a set of labels.
  • XML Core Services - XML Core Services (formerly known as MSXML, for Microsoft Extensible Markup Language or XML) is an application for processing Extensible Stylesheet Language Transformation (XSLT) in an XML file.
  • XML pipeline - An XML pipeline is a formalized, logical expression of the method by which an XML (Extensible Markup Language) document is handled.
  • XMT (Extensible MPEG-4 Textual) - The XMT (Extensible MPEG-4 Textual) format is the use of a textual syntax to represent MPEG-4 3-D scene descriptions.
  • XPRL (Extensible Public Relations Language) - XPRL (Extensible Public Relations Language) is an open specification for an XML-based language being developed for the public relations sector.
  • XQuery - XQuery is a specification for a query language that allows a user or programmer to extract information from an Extensible Markup Language (XML) file or any collection of data that can be XML-like.
  • XrML (Extensible Rights Markup Language) - XrML (Extensible Rights Markup Language) is a proposed standard digital rights management (DRM) markup language.
  • XSD (XML Schema Definition) - XSD is a W3C recommendation that defines the way to utilize the elements in an XML document.
  • XSL (Extensible Stylesheet Language) - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • XSL Transformations (XSLT) - XSL Transformations (XSLT) is a standard way to describe how to transform (change) the structure of an XML (Extensible Markup Language) document into an XML document with a different structure.
  • Yammer - Yammer is a private microblogging and collaboration platform for enterprise social networking.
  • YouTube - YouTube is a free video-hosting website that allows members to store and serve video content.
  • zone file - A zone file is a small set of instructions for resolving specified Internet domain names to the appropriate number form of an Internet Protocol address (an IP address).
  • Zope (Z Object Publishing Environment) - Zope (Z Object Publishing Environment)is a Web site builder and server that uses the idea that it is serving (or "publishing") objects rather than merely providing content that will be added to a Web page.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • cybersecurity insurance (cybersecurity liability insurance)

    Cybersecurity insurance, also called cyber liability insurance or cyber insurance, is a contract that an entity can purchase to ...

  • phishing

    Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication ...

  • cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • NVMe over Fabrics (NVMe-oF)

    NVMe over Fabrics, also known as NVMe-oF and non-volatile memory express over fabrics, is a protocol specification designed to ...

  • logical unit number (LUN)

    A logical unit number (LUN) is a unique identifier for designating an individual or collection of physical or virtual storage ...

  • CIFS (Common Internet File System)

    CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an ...

Close