Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

.NE - DYN

  • .NET Framework - .NET Framework is a managed execution environment for Windows that allows software developers to create a software application in one programming language and be assured the app can work with code written in other languages.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • access log - An access log is a list of all the requests for individual files that people have requested from a Web site.
  • access provider - An access provider is any organization that arranges for an individual or an organization to have access to the Internet.
  • Adobe AIR - Adobe AIR is a developer's tool for creating platform-independent web applications that can be run on a user's desktop.
  • Airborne Internet (A.I.) - The Airborne Internet is a proposed network intended for use in aviation communications, navigation, and surveillance (CNS).
  • Ajax (Asynchronous JavaScript and XML) - Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately.
  • akamaize - For a Web site, to akamaize (pronounced AHK-uh-myez) is to accelerate the delivery of Web files by placing copies on servers closer to the user than the server that delivers the main file for a Web page.
  • alias - In general, as a noun, an alias (pronounced AY-lee-uhs) is an alternate name for someone or something.
  • AltaVista - AltaVista is an Internet search engine.
  • Amazon EC2 (Elastic Compute Cloud) - Amazon Elastic Compute Cloud (Amazon EC2) is a web-based service that allows businesses to run application programs in the Amazon Web Services (AWS) public cloud.
  • Amazon Simple Storage Service (Amazon S3) - Amazon Simple Storage Service (Amazon S3) is a scalable, high-speed, web-based cloud storage service.
  • anonymous email - Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message.
  • Apache ZooKeeper - Apache ZooKeeper is an open source file application program interface (API) that allows distributed processes in large systems to synchronize with each other so that all clients making requests receive consistent data.
  • API gateway - An API gateway is a software pattern that sits in front of an application programming interface (API) or group of microservices, to facilitate requests and delivery of data and services.
  • API management - API management is the process by which an organization creates, oversees and controls application program interfaces (APIs) in a secure and scalable environment.
  • Application Link Enabling (ALE) - Application Link Enabling (ALE) is a mechanism for the exchange of business data between loosely-coupled R/3 applications built by customers of SAP, the enterprise resource management program.
  • application sandboxing - Application sandboxing, also called application containerization, is an approach to software development and mobile application management (MAM) that limits the environments in which certain code can execute.
  • application streaming - Application streaming is an on-demand software delivery model that takes advantage of the fact that most applications require only a small fraction of their total program code to run.
  • Army Knowledge Online (AKO) - Army Knowledge Online (AKO) is the United States Army intranet.
  • AS1 (Applicability Statement 1) - AS1 (Applicability Statement is a specification for Electronic Data Interchange (EDI) communications between businesses using e-mail protocols.
  • AS2 (Applicability Statement 2) - AS2 (Applicability Statement 2) is a specification for Electronic Data Interchange (EDI) between businesses using the Internet's Web page protocol, the Hypertext Transfer Protocol (HTTP).
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • auditor - In Web advertising, this usually means a third-party company that audits the number of visitors to or impression sent from a Web site during some time period.
  • augmented reality (AR) - Augmented reality (AR) is the integration of digital information with live video or the user's environment in real time.
  • automatic vehicle locator (AVL) - An automatic vehicle locator (AVL) is a device that makes use of the Global Positioning System (GPS) to enable a business or agency to remotely track the location of its vehicle fleet by using the Internet.
  • B2B (business-to-business) - B2B (business-to-business), a type of electronic commerce (e-commerce), is the exchange of products, services or information between businesses, rather than between businesses and consumers (B2C).
  • Baidu - Baidu is a Chinese technology, internet search and internet services company.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • bid for placement - Bid for placement is a paid inclusion search engine marketing model in which advertisers select keywords and bid per click for first link placement in search results using those terms.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bookmarklet - A bookmarklet is a JavaScript applet that runs directly in the browser.
  • bot (robot) - A bot (short for 'robot' and also called an internet bot) is a computer program that operates as an agent to either simulate a human activity or for a user or another program.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • Box (Box.net) - Box is an online file-sharing, storage and collaboration service provider that caters to individual users as well as businesses.
  • breadcrumb trail - On a Web site, a breadcrumb trail is a navigation tool that allows a user to see where the current page is in relation to the Web site's hierarchy.
  • browser extension - A browser extension is a small application that adds a capacity or functionality to a browser.
  • bulletin board system (BBS) - A bulletin board system (BBS) is a computer or an application dedicated to the sharing or exchange of messages or other files on a network.
  • buzz marketing - Buzz marketing, also known as viral marketing or word-of-mouth marketing, aims to foster consumer conversations about products and services and spread a company's message via social media.
  • Can Spam Act of 2003 - The Can Spam Act of 2003 is a commonly used name for the United States Federal law more formally known as S.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • captive portal - A captive portal is a Web page that the user of a public-access network is obliged to view and interact with before access is granted.
  • carbon copy (cc) - In e-mail, a carbon copy (abbreviated "cc," and sometimes "fcc" for "first carbon copy") is a copy of a note sent to an addressee other than the main addressee.
  • Career horoscopes for Geeks - 2008 Career horoscopesOur own overview of what you need to focus on in 2008.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • channel partner portal - A channel partner portal is a web-based application that provides a vendor's established partners (usually distributors, resellers, service providers or other strategic partners) with access to deal registration, marketing resources, pricing and sales information for products and services, as well as technical details and support that are unavailable to other end users.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • churn rate - Churn rate is a measure of the number of customers or employees who leave a company during a given period.
  • click-to-callback - Click-to-callback is a Web-based customer relationship management (CRM) technology that enables users browsing a company's Web site to leave a phone number where a company representative can call them back with more information.
  • click-to-talk (CTC) - Click-to-call (CTC), also called click-for-talk, is a technology that converts Web traffic into voice telephone connections using VoIP (Voice over IP).
  • clickjacking (user-interface or UI redressing and IFRAME overlay) - Clickjacking (also known as user-interface or UI redressing and IFRAME overlay) is an exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
  • clipboard hijack attack - A clipboard hijacking is an exploit in which the attacker gains control of the victim's clipboard and replaces its contents with their own data, such as a link to a malicious Web site.
  • cloud application performance management (cloud APM) - Cloud application performance management (cloud APM) is the process of monitoring resources that support software application performance in public cloud, private cloud and hybrid cloud environments, and ultimately taking actions to resolve issues and maintain optimal performance.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
  • CloudAV - CloudAV is a program that combines multiple antivirus applications and scans user files over a network of servers.
  • CloudOn - CloudOn is a web-based collaboration tool that allows users to open, review and edit Microsoft Office documents on any computing device that has a Google Chrome or Apple Safari browser.
  • cloudware - Cloudware is software that runs on a remote Web server rather than on a mobile computing device, personal computer (PC) or traditional on-premises application server.
  • collaborative browsing (co-browsing) - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
  • Commerce XML (cXML or Commerce Extensible Markup Language) - Commerce XML (cXML) is a standard for the online exchange of business transaction information in common formats.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer interactions across various channels are managed.
  • content delivery (content distribution, content distribution delivery, or content caching) - On the Internet, content delivery (sometimes called content distribution, content distribution delivery, or content caching) is the service of copying the pages of a Web site to geographically dispersed servers and, when a page is requested, dynamically identifying and serving page content from the closest server to the user, enabling faster delivery.
  • content filtering (information filtering) - On the Internet, content filtering (also known as information filtering) is the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content personalization - Content personalization is a strategy that tailors webpages and other forms of content to individual users' characteristics or preferences.
  • contextual marketing - Contextual marketing is an online marketing model in which people are served with targeted advertising based on their current page or recent browsing behavior.
  • corportal (Corporate Portal) - Corportal is short for "corporate portal.
  • crawler - A crawler is a program that visits Web sites and reads their pages and other information in order to create entries for a search engine index.
  • cross-sell - Cross-sell is a marketing term for the practice of suggesting related products or services to a customer who is considering buying something.
  • CUSeeMe - CUseeMe is a low-cost product for Internet videoconferencing.
  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital library - A digital library is a collection of documents in organized electronic form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks.
  • Digital Text Platform (DTP) - Digital Text Platform (DTP) is Amazon.
  • DIME (Direct Internet Message Encapsulation) - DIME (Direct Internet Message Encapsulation) is a communications specification that defines a format for attaching files to Simple Object Access Protocol (SOAP) messages between application programs over the Internet.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distance learning (e-learning) - Distance learning, sometimes called e-learning, is a formalized teaching and learning system specifically designed to be carried out remotely by using electronic communication.
  • distributed computing - Distributed computing is a model in which components of a software system are shared among multiple computers.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • distribution list - In e-mail applications, a distribution list is a group of mail recipients that is addressed as a single recipient.
  • do not call list - The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
  • Domino Off-Line Services (DOLS) - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • DXL (Domino Extensible Language) - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • dynamic URL - A dynamic URL is the address - or Uniform Resource Locator (URL) - of a Web page with content that depends on variable parameters that are provided to the server that delivers it.
SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close