Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

GNU - MIC

  • Gnutella - Gnutella is a system in which individuals can exchange files over the Internet directly without going through a Web site in an arrangement sometimes described as peer-to-peer (here meaning "person-to-person").
  • Google Advertising ID - Google Advertising ID is a piece of universally unique identifier code that allows mobile applications running on Android devices to identify users and gather data for the purposes of building profiles.
  • Google Alert - Google Alert is an automated Web search service that can help people and businesses monitor the Internet for developments and activities that could concern them.
  • Google Base - Google Base is an online database and free Web publishing service provided by Google that allows users to upload their own content.
  • Google Docs - Google Docs is a free Web-based application in which documents and spreadsheets can be created, edited and stored online.
  • Google I/O - Google I/O is Google's developer conference held annually in San Francisco.
  • Google Play (Android Market) - Google Play, formerly known as Android Market, is the official distribution storefront for Android applications and other digital media, such a music, movies and books, from Google.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) is Google's social networking platform.
  • Googlewhacking - Googlewhacking is the challenging pursuit of searching the popular Google search engine with a two-word or more search argument that will produce exactly (no less and no more than) one result.
  • Gopher - From about 1992 through 1996, Gopher was an Internet application in which hierarchically-organized text files could be brought from servers all over the world to a viewer on your computer.
  • Government Information Awareness (GIA) - Government Information Awareness (GIA) is a Web site dedicated to making it easy for U.
  • Greasemonkey - Greasemonkey is a browser extension that enables users to customize how Web sites display on their computers.
  • greynet (or graynet) - Greynet is a term for the use of unauthorized applications on a corporate network.
  • grid computing - Grid computing uses small, distributed resources from servers and PCs to solve big problems.
  • Gyricon - Gyricon is a type of electronic paper (sometimes called e-paper) developed at Xerox's Palo Alto Research Center (PARC).
  • HailStorm - Part of Microsoft's .
  • hamburger icon (slide drawer navigation) - The hamburger icon got its name because it resembles a burger in a bun.
  • hard bounce - A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid.
  • hash buster - A hash buster is a program that generates a string of text for insertion in a spam message so that, to a spam filter, the e-mail appears to be a different message each time it is sent.
  • hashtag - A hashtag is atag used to categorize posts on Twitter (tweets) according to topics.
  • high-speed dialup - High-speed dialup, sometimes advertised as broadband dialup, is an Internet service provider (ISP) feature that speeds up data transfer by using a special server, called an acceleration server, to act as a bridge between the user's dialup connection and a Web page.
  • home school - A home school is a school in which parents teach their children an academic curriculum at home instead of sending them out to a public or private school.
  • Hosted CRM - Hosted CRM is an arrangement in which a company outsources some or all of its customer relationship management (CRM) functions to an application service provider (ASP).
  • hosting (Web site hosting, Web hosting, and Webhosting) - Hosting (also known as Web site hosting, Web hosting, and Webhosting) is the business of housing, serving, and maintaining files for one or more Web sites.
  • HTML 5 desktop client - An HTML5 desktop client is a type of remote desktop client that provides an end user with access to a desktop or application through a web browser.
  • hybrid cloud - Hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms.
  • HyperTerminal - HyperTerminal is a communications and terminal emulation program that came with the Windows 98 and Windows XP operating systems.
  • I-SPY Act -- Internet Spyware Prevention Act of 2005 (H.R. 744) - The I-SPY Act, formally known as the Internet Spyware Prevention Act of 2005 (H.
  • ICP (Internet commerce provider) - An ICP (Internet commerce provider) is a company that sells software and services that enable a merchant with a Web site to build an online store on the merchant's own site or on the provider's site.
  • ICQ - ICQ ("I Seek You") is a program you can download that will let you know when friends and contacts are also online on the Internet.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IM bot - An IM bot is a chatterbot program that uses instant messaging (IM) as an application interface.
  • image spam - Image spam is junk email that replaces text with images as a means of fooling spam filters.
  • IMAP (Internet Message Access Protocol) - IMAP (Internet Message Access Protocol) is a standard email protocol that stores email messages on a mail server, but allows the end user to view and manipulate the messages as though they were stored locally on the end user's computing device(s).
  • IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • iNotes (iNotes Web Access) - iNotes (short for iNotes Web Access) allows Lotus Domino users to access their Domino-based mail, calendar, schedule, to-do lists, contact lists, and notebooks from any computer, at any location, as long as they have an Internet connection.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • instant messaging (IM) - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a stand-alone application or embedded software.
  • instant translation - Instant translation is the translation from one language to another of Web pages, e-mail, and online chat text by a computer program so that the translated results appear almost instantly.
  • Integration as a Service (IaaS) - Integration as a Service (IaaS) is a cloud-based delivery model that strives to connect on-premise data with data located in cloud-based applications.
  • integration server - An integration server is a computer server used to facilitate interaction between diverse operating systems and applications across internal and external networked computer systems.
  • intelligent agent - An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences.
  • intelligent video - Intelligent video is digital video technology integrated with analytical software.
  • interaction management - Interaction management is a term some companies use to describe a class of Web services that support online relationships (called communities) and transactions between employees, customers, partners, and suppliers.
  • Interactive Voice Response (IVR) - Interactive Voice Response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
  • interactivity - In computers, interactivity is the dialog that occurs between a human being (or possibly another live creature) and a computer program.
  • internalnet - An internalnet is a network that transmits information between computing devices located inside (and perhaps on) a living body.
  • Internet Explorer (IE) - Internet Explorer (IE) is a World Wide Web browser made by Microsoft for use on its Windows operating system.
  • Internet Explorer Administration Kit (IEAK) - Internet Explorer Administration Kit (IEAK) is a product from Microsoft that enables an organization to centrally manage the customizing, deployment, and maintenance of Microsoft's Web browser, Internet Explorer, for users on different computer platforms.
  • Internet Relay Chat (IRC) - (IUR(For terms frequently used in online keyboard chatting, see chat acronyms.
  • Internet Transaction Server (ITS) - An integral component of SAP's mySAP product group, the Internet Transaction Server (ITS) is the interface that enables efficient communication between an R/3 system of applications and the Internet.
  • Intertainment - Intertainment is the name of an e-business initiative that encourages shopping malls and other public places to provide visitors with free high-speed Internet access.
  • iPlanet - iPlanet is Sun Microsystem's solution for a Web server and related programs intended to allow an enterprise to take advantage of the Internet.
  • Jabber - Jabber is an initiative to produce an open source, XML-based instant messaging platform.
  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • Joe job - A Joe job is an e-mail spoofing exploit in which someone sends out huge volumes of spam that appear to be from someone other than the actual source.
  • Joint Academic Network (JANET) - In the United Kingdom, JANET (Joint Academic Network) is the main backbone network for the UK university system of academic and research computers.
  • Joost (Venice Project) - Joost, formerly known as the Venice Project, is an IPTV service based on peer-to-peer (P2P) technology.
  • JSML (Java Speech API Markup Language) - JSML also stands for JScript Markup Language.
  • Jughead - For most of the 1990s, Jughead was a tool for searching the information on Gopher sites for particular subjects.
  • Kazaa Media Desktop (KMD) - Kazaa (its full name is Kazaa Media Desktop or KMD) is a decentralized Internet peer-to-peer (P2P) file-sharing program owned by Sharman Networks.
  • Keyhole Markup Language (KML) - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
  • Klez - Klez (pronounced KLEHZ) is an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients.
  • knowledge base - In general, a knowledge base is a centralized repository for information: a public library, a database of related information about a particular subject, and whatis.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • LAN party - A LAN party is a gathering in which gamers (devotees of computer games) gather to share a local area network (LAN) and participate in extended gaming sessions of popular games such as Quake, Doom, or Wolfenstein.
  • lawful interception (LI) - Lawful interception (LI) is the legally sanctioned official access to private communications, such as telephone calls or e-mail messages.
  • Learn IT: How Spam Affects Email Marketing Campaigns - 1. What's the difference between spam and legitimate email marketing? Spam is unsolicited bulk email (UBE).
  • Learning Path: E-Business - E-BUSINESS..
  • LexiBot - LexiBot is a specialized search tool developed by BrightPlanet, as a means of searching the deep Web (the hidden part of the Web that may contain 500 times the content accessible to conventional search engines).
  • link checker - A link checker is a program that tests and reports on the validity of the hypertext links on the pages in a Web site.
  • LinkedIn - LinkedIn is a social networking site for the business community.
  • list server (mailing list server) - A list server (mailing list server) is a program that handles subscription requests for a mailing list and distributes new messages, newsletters, or other postings from the list's members to the entire list of subscribers as they occur or are scheduled.
  • list washing - In the language of spam, list washing is the process of removing an e-mail address from a mailing list when the recipient either requests removal or complains to the sender's ISP (Internet service provider) that he is being spammed.
  • listserv (mailing list server) - Listserv, like Majordomo, is a small program that automatically redistributes e-mail to names on a mailing list.
  • LiveJournal - LiveJournal is a social media platform that allows users to keep a blog, journal or diary and share their interests with LiveJournal friends or communities around the world.
  • LMGTFY (Let Me Google That For You) - LMGTFY (Let Me Google That For You) is a website that creates a demonstration of how to conduct a user-specified Google search.
  • Lotus Workplace - Lotus Workplace is a set of customizable online work collaboration products from IBM's Lotus division.
  • Lynx - Lynx is a keyboard-oriented text-only Web browser that was developed at the University of Kansas primarily for students who used UNIX workstations.
  • mail bomb - A mail bomb is the sending of a massive amount of e-mail to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, Internet mailer) - A mail server (also known as a mail transfer agent or MTA, a mail transport agent, a mail router or an Internet mailer) is an application that receives incoming e-mail from local users (people within the same domain) and remote senders and forwards outgoing e-mail for delivery.
  • mailing list - A mailing list is a list of people who subscribe to a periodic mailing distribution on a particular topic.
  • Majordomo - Like listserv, Majordomo (from Latin: "master of the house") is a small program that automatically redistributes e-mail to names on a mailing list.
  • managed service provider (MSP) - A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model.
  • management service provider (MSP) - Also see two related terms, application service provider and storage service provider.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • maps - Get a map of your (or someone else's) town, neighborhood, or street.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • mbox - The most common format for storing e-mail messages on a hard drive is the mbox format, in which all the messages for each mailbox are stored as a single, long, text file.
  • Mesh Connectivity Layer (MCL) - Mesh Connectivity Layer (MCL) is a technology that allows a computer user to connect to a wireless mesh network that uses Wi-Fi or WiMax.
  • messaging - In general, messaging (also called electronic messaging) is the creation, storage, exchange, and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data Interchange (EDI) over a communications network.
  • messaging server - A messaging server is a middleware program that handles messages that are sent for use by other programs using a messaging application program interface (API).
  • Metro apps - Metro apps are touch-screen-friendly apps written especially for Microsoft's WinRT programming interfaces.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • Web application firewall (WAF)

    A web application firewall (WAF) is a firewall that monitors, filters and blocks data packets as they travel to and from a ...

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close