Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

CUS - GMA

  • custom domain name suffix (custom TLD) - A custom domain name suffix, or custom TLD, is a top-level domain (TLD) name that belongs to a single organization.
  • customer relationship analysis (CRA) - Customer relationship analysis (CRA), sometimes termed customer relationship analytics, is the processing of data about customers and their relationship with the enterprise in order to improve the enterprise's future sales and service and lower cost.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service and support (CSS) is the part of a company's customer relationship management (CRM) department that interacts with a customer for their immediate benefit, including components such as the contact center, the help desk, and the call management system.
  • customer-facing - Customer-facing is an adjective used to describe a hardware or software product, technology, or anything that the customer of a business deals with directly.
  • customer-managed relationship (CMR) - A customer-managed relationship (CMR) is a relationship in which a business uses a methodology, software, and perhaps Internet capability to encourage the customer to control access to information and ordering.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • dashboard - In information technology, a dashboard is a user interface that, somewhat resembling an automobile's dashboard, organizes and presents information in a way that is easy to read.
  • Defense Message System (DMS) - The Defense Message System (DMS) is a secure X.
  • demo and demoscene - A demo is a non-interactive multimedia presentation that is rendered in real time.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • destreaming - Destreaming, in a multimedia context, is the practice of saving streamed data as a file.
  • device-agnostic (device agnosticism) - Device agnostic is a description for computing components that work with various systems without requiring any special adaptations.
  • digital cash (eCash) - Digital cash is a system of purchasing cash credits in relatively small amounts, storing the credits in your computer, and then spending them when making electronic purchases over the Internet.
  • digital library - A digital library is a collection of documents in organized electronic form, available on the Internet or on CD-ROM (compact-disk read-only memory) disks.
  • Digital Silhouettes - Digital Silhouettes is the trademarked name that Predictive Networks has given to user profiles that are established through gathered click stream data and artificial intelligence (AI) processes.
  • Digital Text Platform (DTP) - Digital Text Platform (DTP) is Amazon.
  • DIME (Direct Internet Message Encapsulation) - DIME (Direct Internet Message Encapsulation) is a communications specification that defines a format for attaching files to Simple Object Access Protocol (SOAP) messages between application programs over the Internet.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • directory harvest attack (DHA) - A directory harvest attack (DHA) is an attempt to determine the valid e-mail addresses associated with an e-mail server so that they can be added to a spam database.
  • DirXML - DirXML is Novell's directory interchange software that uses XML to keep different directories synchronized.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distance learning (e-learning) - Distance learning, sometimes called e-learning, is a formalized teaching and learning system specifically designed to be carried out remotely by using electronic communication.
  • distributed computing - In general, distributed computing is any computing that involves programs with components shared among multiple computers.
  • distributed search - Distributed search is a search engine model in which the tasks of Web crawling, indexing and query processing are distributed among multiple computers and networks.
  • distribution list - In e-mail applications, a distribution list is a group of mail recipients that is addressed as a single recipient.
  • do not call list - The "do not call" list is a registry of phone numbers in the United States that telemarketers are prohibited from calling in most circumstances.
  • DomainKeys - DomainKeys is an anti-spam software application in development at Yahoo that uses a form of public key cryptography to authenticate the sender's domain.
  • Domino Off-Line Services (DOLS) - Domino Off-Line Services (DOLS) is an add-on toolkit, based on Domino replication and security features, that allows users to access and interact with Domino Web applications through a browser without requiring a network connection, and to synchronize changes to source data when they reconnect.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • Drupal - Drupal is free, open source software that can be used by individuals or groups of users -- even those lacking technical skills -- to easily create and manage many types of Web sites.
  • DXL (Domino Extensible Language) - DXL (Domino Extensible Language) is a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • dynamic URL - A dynamic URL is the address - or Uniform Resource Locator (URL) - of a Web page with content that depends on variable parameters that are provided to the server that delivers it.
  • E Ink (eInk) - E Ink is an electronic device that is similar to a computer display, but with qualities that enable it to be used for applications such as eBooks, electronic newspapers, portable signs, and foldable, rollable displays.
  • e-brokerage - An e-brokerage is a brokerage house that allows you to buy and sell stocks and obtain investment information from its Web site.
  • e-commerce hosting - E-commerce hosting is a business in which a company provides other companies whatever they need to sell their products and services on the World Wide Web - including a Web server to serve a company's pages, possibly the Web site design (including catalog pages), and the special capabilities needed to accept, process, and confirm sales orders.
  • e-copy - An e-copy is an electronic copy of a document.
  • e-mail (electronic mail or email) - E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • e-mail extractor - An e-mail extractor is a program that finds e-mail addresses and stores them in a list file, with each line containing one e-mail address.
  • e-mail postage (sender pays) - E-mail postage (sometimes referred to as sender pays) is a proposed system that would involve charging senders a very small amount of money (sometimes called a micropayment) for the delivery of each e-mail message sent.
  • e-mail reflector - An e-mail reflector is a program that acts as the forwarding broadcaster of e-mail messages to the names on a distribution list.
  • e-outsourcing - For a business, e-outsourcing is buying information technology products and services that could be furnished in-house from one or a variety of sources on the Internet.
  • e-paper (radio paper or electronic paper) - E-paper (sometimes called radio paper or just electronic paper) is a portable, reusable storage and display medium that looks like paper but can be repeatedly written on (refreshed) - by electronic means - thousands or millions of times.
  • e-procurement (supplier exchange) - E-procurement is the business-to-business purchase and sale of supplies and services over the Internet.
  • e-services (electronic services) - E-services, a business concept developed by Hewlett Packard (HP), is the idea that the World Wide Web is moving beyond e-business and e-commerce (that is, completing sales on the Web) into a new phase where many business services can be provided for a business or consumer using the Web.
  • e-support - Part of the growing trend toward online customer relationship management (CRM), e-support is the electronic (usually Web-based) version of customer service that would otherwise have required either a visit to a company or a telephone call.
  • e-ticket (electronic ticket) - An e-ticket (electronic ticket) is a paperless electronic document used for ticketing passengers, particularly in the commercial airline industry.
  • E2E (exchange-to-exchange) - On the Internet, E2E has been used to mean exchange-to-exchange - that is, the exchange of information or transactions between Web sites that themselves serve as exchanges or brokers for goods and services between businesses.
  • EAI (enterprise application integration) - Enterprise application integration (EAI) is the task of uniting the databases and workflows associated with business applications to ensure that the business uses the information consistently and that changes to core business data made by one application are correctly reflected in others.
  • EBPP (electronic bill presentment and payment) - On the Internet, electronic bill presentment and payment (EBPP) is a process that enables bills to be created, delivered, and paid over the Internet.
  • eddress (email address) - Short form for " e-mail address.
  • Eggdrop - Eggdrop is an Internet Relay Chat (IRC) program for Linux or UNIX users that sits in the background of an IRC?channel to manage and protect a chat.
  • Electronic Funds Transfer (EFT) - Electronic Funds Transfer (EFT) is a system of transferring money from one bank account directly to another without any paper money changing hands.
  • electronic ink - Electronic ink is a liquid substance, in development at MIT's Media Lab in partnership with a company called E Ink, that responds to electrical impulses to enable changeable text and image displays on a flexible surface.
  • electronic newspaper - An electronic newspaper is a self-contained, reusable, and refreshable version of a traditional newspaper that acquires and holds information electronically.
  • electronic postmaster - An electronic postmaster is the capability in a program, usually a special program designated as an e-mail server, for handling the distribution, forwarding, and receiving of e-mail in a network.
  • email archiving - Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email messages to enable fast retrieval.
  • email spam - Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.
  • email spoofing - Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
  • emoticon - An emoticon is a short sequence of keyboard letters and symbols, usually emulating a facial expression, that complements a text message.
  • encoding and decoding - Encoding is the process of putting a sequence of characters (letters, numbers, punctuation, and certain symbols) into a specialized digital format for efficient transmission or transfer.
  • endpoint reference (EPR) - An endpoint reference (EPR) is a combination of Web services (WS) elements that define the address for a resource in a Simple Object Access Protocol (SOAP) header.
  • enterprise app store (enterprise application store) - An enterprise app store is a web portal through which end users can access, download and install corporate-approved software applications.
  • Enterprise Cloud Computing FAQ - Enterprise cloud computing is the special case of utilizing cloud computing for competitive advantage through breakout opportunities both for cost savings and, more importantly, for business innovation in terms of unprecedented speed and agility with vastly improved collaboration among business partners and customers.
  • enterprise information portal (EIP) - The enterprise information portal (EIP), also known as a business portal, is a concept for a Web site that serves as a single gateway to a company's information and knowledge base for employees and possibly for customers, business partners, and the general public as well.
  • EOM (end of message) - EOM stands for "end of message.
  • ERM (enterprise resource management) - ERM also stands for enterprise relationship management.
  • ERP (enterprise resource planning) - ERP, or enterprise resource planning, is a modular software system designed to integrate the main functional areas of an organization's business processes into a unified system.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ETRN (Extended Turn) - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • event-driven architecture (EDA) - An event-driven architecture (EDA) is a framework that orchestrates behavior around the production, detection and consumption of events as well as the responses they evoke.
  • Exim - Exim is an open source mail transfer agent (MTA), which is a program responsible for receiving, routing, and delivering e-mail messages (this type of program is sometimes referred to as an Internet mailer, or a mail server program).
  • Extensible Authentication Protocol (EAP) - The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands on authentication methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the Internet.
  • Facebook - Facebook is a popular free social networking website that allows registered users to create profiles, upload photos and video, send messages and keep in touch with friends, family and colleagues.
  • false positive - This definition of false positive explains what the term means and how it applies in various contexts.
  • FAQ (frequently-asked questions) - The FAQ (pronounced FAK) or list of "frequently-asked questions" (and answers) has become a feature of the Internet.
  • FastCGI - FastCGI is a programming interface that can speed up Web applications that use the most popular way to have the Web server call an application, the common gateway interface (CGI).
  • Fcc - In Eudora and perhaps other e-mail facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • Fibre Channel over IP (FCIP or FC/IP) - Fibre Channel over IP (FCIP or FC/IP, also known as Fibre Channel tunneling or storage tunneling) is an Internet Protocol (IP)-based storage networking technology developed by the Internet Engineering Task Force (IETF).
  • FidoNet - Started in 1984, FidoNet is a system for exchanging e-mail and discussion group and other files among users of over 30,000 bulletin board services.
  • Firefox - Firefox is a Web browser that is smaller, faster, and in some ways more secure than the Netscape browser from which much of its code was derived.
  • Firefox 3.5 - Firefox 3.5 is a version of the Mozilla Foundation's Web browser that was released in June 2009.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • Floating Ad - A floating ad is a type of rich media Web advertisement that appears uninitiated, superimposed over a user-requested page, and disappears or becomes unobtrusive after a specific time period (typically 5-30 seconds).
  • FLV file format - FLV is a file format used by Adobe Flash Player and Adobe AIR for storing and delivering synchronized audio and video streams.
  • Foo Camp - Foo Camp was a gathering of about 200 computer and Internet thinkers and inventors who were invited by publisher O'Reilly and Associates to spend a week-end brainstorming, collaborating, and otherwise advancing progress in information technology.
  • FpML (Financial Products Markup Language) - Financial Products Markup Language (FpML) is a business information exchange standard based on Extensible Markup Language (XML) that enables business-to-business over-the-counter (OTC) financial derivative transactions using the Internet.
  • free software - Free software is software that can be freely used, modified, and redistributed with only one restriction: any redistributed version of the software must be distributed with the original terms of free use, modification, and distribution (known as copyleft).
  • freemail - Freemail is a service that provides free e-mail delivery to anyone in exchange for exposure to advertising on the site where you request your e-mail and, in some cases, for some personal information.
  • FSP (full-service provider) - On the Internet, an FSP (full-service provider) is an application service provider (ASP) that offers a wide range of Web-based information technology services to other companies - including the planning and creation of a Web presence, providing needed software applications, and hosting and maintaining the Web site.
  • FTP (File Transfer Protocol) - File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.
  • fuzzy search - A fuzzy search is a process that locates Web pages that are likely to be relevant to a search argument even when the argument does not exactly correspond to the desired information.
  • gamer - A gamer is a devoted player of electronic games, especially on machines especially designed for such games and, in a more recent trend, over the Internet.
  • gamification - Gamification is the application of game theory concepts and techniques to non-game activities.
  • gaming - Gaming is the running of specialized applications known as electronic games, especially on machines designed for such programs and, in a more recent trend, using personal computers on the Internet in which case the activity is known as online gaming.
  • geek speak - Geek speak is how the uninitiated refer to the jargon and special vocabulary used by those immersed in computers and other fields of information technology.
  • geo-fencing (geofencing) - Geo-fencing is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries.
  • Gmail - Gmail (pronounced Gee-mail) is a free Web-based e-mail service currently being tested at Google that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close