Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

.NE - CUS

  • .NET - .NET is both a business strategy from Microsoft and its collection of programming support for Web services.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • 3-D browser - A 3-D browser is a Web browser that allows the viewer to view and interact with six Web pages at a time by creating a virtual room on the viewer's screen.
  • 6to4 - 6to4 is a tunneling mechanism used to transfer IPv6 (Internet Protocol version 6) packets over an IPv4 infrastructure, typically the IPv4 Internet.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • access provider - An access provider is any organization that arranges for an individual or an organization to have access to the Internet.
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • Airborne Internet (A.I.) - The Airborne Internet is a proposed network intended for use in aviation communications, navigation, and surveillance (CNS).
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • akamaize - For a Web site, to akamaize (pronounced AHK-uh-myez) is to accelerate the delivery of Web files by placing copies on servers closer to the user than the server that delivers the main file for a Web page.
  • alias - In general, as a noun, an alias (pronounced AY-lee-uhs) is an alternate name for someone or something.
  • AltaVista - AltaVista is an Internet search engine.
  • Amaya - Amaya is the Web browser that was developed by members of the World Wide Web Consortium (W3C) as a practical tool as well as a testing ground for W3C ideas.
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud is an Amazon Web Services cloud server hosting tool that allows a business to provision resources for public cloud IT projects.
  • Amazon S3 - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service designed for online backup and archiving of data and applications on Amazon Web Services.
  • Ananova - Ananova is a Web-oriented news service that features a computer-simulated animation of a woman newscaster, named "Ananova," who has been programmed to "read" newscasts to Web users.
  • anonymous email - Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message.
  • anonymous Web surfing (Web anonymizer, SafeWeb) - Anonymous Web surfing allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited.
  • antidisintermediation - In commerce, antidisintermediation is a term used to describe the preservation of intermediary positions.
  • Antigen - Sybari's Antigen is antivirus software for Lotus Domino and Microsoft Exchange.
  • Apache ZooKeeper - Apache ZooKeeper is an open source file application program interface (API) that allows distributed processes in large systems to synchronize with each other so that all clients making requests receive consistent data.
  • API gateway - An API gateway is programming that sits in front of an application programming interface (API) and acts as a single point of entry for a defined group of microservices.
  • API management - API management is the process of overseeing application programming interfaces (APIs) in a secure, scalable environment.
  • Application Link Enabling (ALE) - Application Link Enabling (ALE) is a mechanism for the exchange of business data between loosely-coupled R/3 applications built by customers of SAP, the enterprise resource management program.
  • application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and mobile application management (MAM) that limits the environments in which certain code can execute.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • apps-on-tap (applications on tap) - Apps-on-tap (short for "applications on tap") is computer industry jargon for application programs or other services (Hewlett-Packard calls them e-services) that are available online for businesses or consumers.
  • ArchiveSink - In a Windows environment, ArchiveSink is code that is activated through a defined trigger, such as the receipt of a new e-mail message, in order to archive messages coming in and out of an Exchange 2000 Server.
  • Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
  • AS1 (Applicability Statement 1) - AS1 (Applicability Statement is a specification for Electronic Data Interchange (EDI) communications between businesses using e-mail protocols.
  • AS2 (Applicability Statement 2) - AS2 (Applicability Statement 2) is a specification for Electronic Data Interchange (EDI) between businesses using the Internet's Web page protocol, the Hypertext Transfer Protocol (HTTP).
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
  • auditor - In Web advertising, this usually means a third-party company that audits the number of visitors to or impression sent from a Web site during some time period.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • autofax - Autofax is the automatic (computer-initiated) sending of a facsimile (fax) message over a network in one of two ways: ( to a receiving computer or fax machine that is always ready to receive and store or immediately print such transmissions or (2), in some cases, as an e-mail note.
  • automatic language translation - Automatic language translation is the use of a computer program to translate input text from one national language to another while maintaining the original document format.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • B2B (business-to-business) - On the Internet, B2B (business-to-business), also known as e-biz, is the exchange of products, services, or information between businesses rather than between businesses and consumers.
  • B2G (Business2Government or Business-to-Government) - On the Internet, B2G is business-to-government (a variation of the term B2B or business-to-business), the concept that businesses and government agencies can use central Web sites to exchange information and do business with each other more efficiently than they usually can off the Web.
  • Baidu - Baidu is a Chinese technology, internet search and internet services company.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bcc (blind carbon copy or blind courtesy copy) - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BetterWhois - BetterWhois, named after the original whois, lets you look up registration information from all Internet domain name registrars at the same time.
  • bid for placement - Bid for placement is a paid inclusion search engine marketing model in which advertisers select keywords and bid per click for first link placement in search results using those terms.
  • BitPass - BitPass is a micropayment service that facilitates online content access transactions by integrating the processes involved in buying and selling content, and making it practical to charge very small amounts of money.
  • BitTorrent - BitTorrent is a content distribution protocol that enables efficient software distribution and peer-to-peer sharing of very large files, such as entire movies and TV shows, by enabling users to serve as network redistribution points.
  • blackhole list (blacklist) - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • blacksurfing - Blacksurfing is surfing the Web using an inverted palette, with white text on a black body.
  • blogosphere - Blogosphere is a term some writers have used to describe the grassroots and interactive journalism made possible by participants in blogs (logs or journals maintained on the Internet) and the symbiotic relationship between bloggers and traditional journalists.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • board - In computers, a board, depending on usage, can be short for motherboard, the physical arrangement of a computer's basic components and circuitry, or it can refer to an expansion board (or card or adapter), which fits into one of the computer's expansion slots and provides expanded capability.
  • bookmark portal - A bookmark portal is a free application service provider (ASP) Web site that allows registered users to save "bookmark" (Netscape) or "favorite" (Internet Explorer) Web links so that they can be accessed at any time from any Internet-connected device.
  • bookmarklet - A bookmarklet is a JavaScript applet that runs directly in the browser.
  • books (text) online - Fortunately, there is a way to find out whether a given book exists online as viewable text:The On-line Books Page (http://digital.
  • bot (robot) - A bot (short for "robot") is a program that operates as an agent for a user or another program or simulates a human activity.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • Box (Box.net) - Box is an online file-sharing, storage and collaboration service provider that caters to individual users as well as businesses.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • buddy list - In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • business technology management (BTM) - Business technology management (BTM) is a term for a group of services intended to help businesses that might not have their own information technology (IT) department.
  • buzz marketing - Buzz marketing, also known as viral marketing or word-of-mouth marketing, aims to foster consumer conversations about products and services and spread a company's message via social media.
  • Camram (Campaign for Real Mail) - Camram -- the name derives from "Campaign for Real Mail" -- is a method for controlling spam that requires spammers to spend resources for each piece of mail sent.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • Career horoscopes for Geeks - 2008 Career horoscopesOur own overview of what you need to focus on in 2008.
  • Catalogue of Life - The Catalogue of Life project is an international initiative intended to catalog every life form on the planet according to a standardized taxonomy and to organize that information into a comprehensive and universally accessible database system.
  • censorware - Censorware is a term used pejoratively to describe software that filters out undesirable Web sites or content.
  • challenge-response authentication - In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, and another entity provides a valid response to be authenticated.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • click-to-callback - Click-to-callback is a Web-based customer relationship management (CRM) technology that enables users browsing a company's Web site to leave a phone number where a company representative can call them back with more information.
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • cloud application performance management (CAPM) - Cloud application performance management (CAPM or cloud APM) is the process of monitoring resources that support application program performance in private and hybrid cloud environments.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the Internet.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
  • cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
  • collaborative browsing (co-browsing) - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
  • collaborative citizen journalism (CCJ) - Collaborative citizen journalism (CCJ), a concept made possible by the Internet and the advent of blogging, is the pooling of research and reporting by volunteers to develop journalistic news stories or to critically examine existing ones, especially stories from the mainstream media.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer contacts are managed.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content filtering (information filtering) - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • content management system (CMS) - A content management system (CMS) is an application program for creating and managing digital content in a collaborative environment.
  • ContextAds - ContextAds is a targeted advertising program designed for the Linden Lab Second Life virtual community.
  • contextual marketing - Contextual marketing is an online marketing model in which people are served with targeted advertising based on their current page or recent browsing behavior.
  • corportal (Corporate Portal) - Corportal is short for "corporate portal.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • crimeware - Crimeware is any computer program or set of programs designed expressly to facilitate illegal activity online.
  • cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.

-ADS BY GOOGLE

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close