Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

SAM - VIM

  • Samba - Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet.
  • Same Origin Policy (SOP) - The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.
  • Sametime - Sametime is software from Lotus for group collaboration over the Internet.
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • SAX (Simple API for XML) - SAX (Simple API for XML) is an application program interface (API) that allows a programmer to interpret a Web file that uses the Extensible Markup Language (XML) -- that is, a Web file that describes a collection of data.
  • scam-baiting - Scam-baiting is the practice of eliciting attention from the perpetrator of a scam by feigning interest in whatever bogus deal is offered.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • searching - On the Internet, searching is just trying to find the information you need.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • self-sending spam - Self-sending spam is unsolicited e-mail that looks like you sent it to yourself: your name appears on the "from" line as well as the "to" line.
  • Sender ID - Sender ID is Microsoft's proposed e-mail sender authentication protocol designed to protect against domain spoofing and phishing exploits.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is an anti-spam approach in which the Internet domain of an e-mail sender can be authenticated for that sender, thereby discouraging spam mailers, who routinely disguise the origin of their e-mail, a practice known as e-mail spoofing.
  • SEO (search engine optimization) - Search engine optimization (SEO) is an area of website development that seeks to improve the way content is ranked by search engines.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • shopping cart - On a Web site that sells products or services online, the shopping cart is a common metaphor (from the original grocery store shopping cart) for the catalog or other pages where a user reads and makes selections.
  • short message - A short message is a brief text message sent to or from a mobile phone subscriber through the Short Message Service (SMS).
  • Shoshkele - A Shoshkele (pronounced Shosh-KEY-lee) is a proprietary type of floating ad developed by United Virtualities.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • Sina Weibo - Sina Weibo is a social networking and microblogging service based in China with more than 368 million registered users.
  • single-serving site - A single-serving site is a one-page, one-purpose website with a dedicated domain name.
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • SiteSweeper - Apparently no longer distributed, SiteSweeper was a program that tested and reported on the validity of the hypertext link on the pages in a Web site.
  • Skype - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
  • skyscraper - A skyscraper ad is a tall and narrow banner advertisement usually placed to the right of content on a Web page.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart home or building (home automation or domotics) - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • Smart Tags - Microsoft's Smart Tags were a proposed feature of Windows XP that would allow Microsoft and its partners to insert their own links into any Web page viewed through its Internet Explorer browser.
  • smart wristwatch - A smart wristwatch is a wristwatch that not only tells time but, using a wireless connection to an information source, can show you the news, stock, sports scores, or weather; remind you of meetings on your Outlook calendar; provide instant messaging input from others; and update the time when you move to another time zone.
  • SmartDownload - Netscape's SmartDownload is a free software program that allows a user to pause, stop, and resume a file download without losing any data.
  • smiley - In Internet e-mail messages and Web discussions, a smiley is a sequence of typed characters that graphically produces the sideways image of someone smiling, like this::-)The first use of a smiley is currently attributed to Scott E.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
  • social bookmarking - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social networking - Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals.
  • social spreadsheet - A social spreadsheet is social software that combines a spreadsheet with a wiki.
  • soft bounce - A soft bounce is an e-mail message that gets as far as the recipient's mail server but is bounced back undelivered before it gets to the intended recipient.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • Solidity - Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.
  • spam cocktail (or anti-spam cocktail) - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
  • spam filter - A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.
  • spamblock - A spamblock is a text segment interjected into an e-mail address to foil a spambot (a program that a spammer uses to troll the Internet seeking e-mail addresses).
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • spear phishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spend management - In an enterprise, spend management is managing how to spend money to best effect in order to build products and services.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • split - Among Internet Relay Chat (IRC) users, a split is a condition where two or more IRC servers are temporarily unable to communicate.
  • splog (spam blog) - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
  • SQL injection - A SQL injection (SQLi) is a type of security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data.
  • SQUID - SQUID is also an abbreviation for Source Quench Introduced Delay, a networking term, and superconducting quantum interference device.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities.
  • storage service provider (SSP) - Also see two related terms, application service provider and management service provider.
  • Stuff I've Seen - Stuff I've Seen is the name of a capability under study by Microsoft that allows a Windows user to quickly locate all occurrences of any item of information the user has previously created or read, whether in e-mail, address books, Web pages, or office documents, all from a single search box built into the task bar.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach of assessing suppliers' contributions and influence on success, determining tactics to maximize suppliers' performance and developing the strategic approach for executing on these determinations.
  • synchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
  • syndication - In general, syndication is the supply of material for reuse and integration with other material, often through a paid service subscription.
  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • teergrube - A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.
  • telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.
  • Telnet - What is Telnet? Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • Thing - A Thing is an interactive object for a Web page that is developed with an authoring tool called ThingMaker that is sold by the Parable Corporation.
  • tModel - A tModel is a data structure representing a service type (a generic representation of a registered service) in the UDDI (Universal Description, Discovery, and Integration) registry.
  • Top 10 Spyware Threats - Visit our spyware feature page to learn more about this problem and how SMBs can beat it.
  • topsite - A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transactional e-mail - Transactional e-mail is a type of Web-based marketing in which e-mail recipients can buy goods and services directly from an e-mail message, without being redirected to the retailer's Web site.
  • tumblelog - A tumblelog is a blog that supports short-form mixed media content.
  • Tumblr - Tumblr is a free microblogging site.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • tweet - A tweet is a post on Twitter.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • UBE (unsolicited bulk email) - UBE (unsolicited bulk email) is a formal term for spam.
  • UCE (unsolicited commercial email) - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unified messaging (unified messaging system or UMS) - Unified messaging (sometimes referred to as the unified messaging system or UMS) is the handling of voice, fax, and regular text messages as objects in a single mailbox that a user can access either with a regular e-mail client or by telephone.
  • Universal Business Language (UBL) - Universal Business Language (UBL) is a royalty-free set of documents based on the ebXML (Electronic Business XML) Core Components Technical Specification, also known as ISO 15000-5.
  • up-sell - Up-sell is a marketing term for the practice of suggesting higher priced products or services to a customer who is considering a purchase.
  • URL shortener - A URL shortener is a Web site that will create a short Uniform Resource Locator (URL) or Web page address from a long one so that the short version, which is easier to remember and enter, can be used instead.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • user script - A user script is programming that modifies the appearance or behavior of an application.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • value chain - A value chain is "a string of companies working together to satisfy market demands.
  • value-added network (VAN) - A value-added network (VAN) is a private network provider (sometimes called a turnkey communications line) that is hired by a company to facilitate electronic data interchange (EDI) or provide other network services.
  • vCalendar - vCalendar is an industry standard format for exchanging scheduling and activity-recording information electronically.
  • vCard - A vCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards.
  • Veronica - Veronica is a program that allowed you to search the files of the Internet's Gopher servers for a particular search string.
  • video e-mail - Video e-mail is an e-mail message with a video file either inserted in the body of the message or accessible through a hypertext link.
  • Vimeo - Vimeo is a U.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close