Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

SNA - WIN

  • snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
  • social bookmarking - Social bookmarking is a user-defined taxonomy system for bookmark s.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social networking - Social networking is the practice of expanding the number of one's business and/or social contacts by making connections through individuals.
  • soft bounce - A soft bounce is an e-mail message that gets as far as the recipient's mail server but is bounced back undelivered before it gets to the intended recipient.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • Solidity - Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.
  • spam cocktail (or anti-spam cocktail) - A spam cocktail (or anti-spam cocktail) is the use of several different technologies in combination to successfully identify and minimize spam.
  • spam filter - A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is the inclusion of an option in an online form that is preselected by default with the expectation that the user will fail to notice the option.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spamhaus - A spamhaus (haus is the German word for house) is an Internet service provider (ISP) or other business that allows the distribution of unsolicited commercial e-mail (UCE).
  • spear phishing - Spear phishing is an email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spend management - In an enterprise, spend management is managing how to spend money to best effect in order to build products and services.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
  • split - Among Internet Relay Chat (IRC) users, a split is a condition where two or more IRC servers are temporarily unable to communicate.
  • splog (spam blog) - A splog (spam blog) is a fake blog created solely to promote affiliated Web sites, with the intent of skewing search results and artificially boosting traffic.
  • SQL injection - A SQL injection (SQLi) is a security exploit in which the attacker adds Structured Query Language (SQL) code to a Web form input box in order to gain access to unauthorized resources or make changes to sensitive data.
  • SQUID - SQUID is also an abbreviation for Source Quench Introduced Delay, a networking term, and superconducting quantum interference device.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks - and unavailable to other entities.
  • storage service provider (SSP) - Also see two related terms, application service provider and management service provider.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach of assessing suppliers' contributions and influence on success, determining tactics to maximize suppliers' performance and developing the strategic approach for executing on these determinations.
  • synchronous groupware - Synchronous groupware is programming that enables real-time collaboration among geographically-distributed work group members.
  • syndication - In general, syndication is the supply of material for reuse and integration with other material, often through a paid service subscription.
  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • teergrube - A teergrube (German for tar pit) is a computer server set up to be intentionally slow, as a trap for spammers using address harvesting programs.
  • telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.
  • Telnet - Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • Thing - A Thing is an interactive object for a Web page that is developed with an authoring tool called ThingMaker that is sold by the Parable Corporation.
  • tModel - A tModel is a data structure representing a service type (a generic representation of a registered service) in the UDDI (Universal Description, Discovery, and Integration) registry.
  • Top 10 Spyware Threats - Visit our spyware feature page to learn more about this problem and how SMBs can beat it.
  • topsite - A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • transactional e-mail - Transactional e-mail is a type of Web-based marketing in which e-mail recipients can buy goods and services directly from an e-mail message, without being redirected to the retailer's Web site.
  • tumblelog - A tumblelog is a blog that supports short-form mixed media content.
  • Tumblr - Tumblr is a free microblogging site.
  • Tuxedo (Transactions for UNIX, Enhanced for Distributed Operation) - Tuxedo (which stands for Transactions for UNIX, Enhanced for Distributed Operation) is a middleware product that uses a message-based communications system to distribute applications across various operating system platforms and databases.
  • tweet - A tweet is a post on Twitter.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • Twitter - Twitter is a free social networking microblogging service that allows registered members to broadcast short posts called tweets.
  • UBE (unsolicited bulk email) - UBE (unsolicited bulk email) is a formal term for spam.
  • UCE (unsolicited commercial email) - UCE (unsolicited commercial e-mail) is a legal term used to describe an electronic promotional message sent to a consumer without the consumer's prior request or consent.
  • unified messaging (unified messaging system or UMS) - Unified messaging (sometimes referred to as the unified messaging system or UMS) is the handling of voice, fax, and regular text messages as objects in a single mailbox that a user can access either with a regular e-mail client or by telephone.
  • Universal Business Language (UBL) - Universal Business Language (UBL) is a royalty-free set of documents based on the ebXML (Electronic Business XML) Core Components Technical Specification, also known as ISO 15000-5.
  • up-sell - Up-sell is a marketing term for the practice of suggesting higher priced products or services to a customer who is considering a purchase.
  • URL shortener - A URL shortener is a Web site that will create a short Uniform Resource Locator (URL) or Web page address from a long one so that the short version, which is easier to remember and enter, can be used instead.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • user script - A user script is programming that modifies the appearance or behavior of an application.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • value chain - A value chain is "a string of companies working together to satisfy market demands.
  • value-added network (VAN) - A value-added network (VAN) is a private network provider (sometimes called a turnkey communications line) that is hired by a company to facilitate electronic data interchange (EDI) or provide other network services.
  • vCalendar - vCalendar is an industry standard format for exchanging scheduling and activity-recording information electronically.
  • vCard - A vCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards.
  • Veronica - Veronica is a program that allowed you to search the files of the Internet's Gopher servers for a particular search string.
  • video e-mail - Video e-mail is an e-mail message with a video file either inserted in the body of the message or accessible through a hypertext link.
  • Vimeo - Vimeo is a U.
  • virtual call center - A virtual call center is a call center in which the organization's representatives are geographically dispersed, rather than being situated at work stations in a building operated by the organization.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual ISP (virtual Internet service provider, VISP or vISP) - A virtual ISP (virtual Internet service provider, sometimes abbreviated as VISP or vISP) is a company that offers Internet services under its own company or brand name, while actually using the equipment and facilities of another ISP to provide those services.
  • virtual microscopy - Virtual microscopy is a method of posting microscope images on, and transmitting them over, computer networks.
  • virtual network adapter - A virtual network adapter is a program (instead of a physical network adapter) that allows a computer to connect to a network.
  • Virtual Storage Portal (VSP) - Another meaning for VSP is vertical solutions provider.
  • virtual trade shows - A virtual trade show is an online version of an event at which goods and services for a specific industry are exhibited and demonstrated.
  • VKontakte (VK) - VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.
  • vlog (video blog) - A vlog (or video blog) is a blog that contains video content.
  • voice portal (vortal) - A voice portal (sometimes called a vortal) is a Web portal that can be accessed entirely by voice.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • voice-enabled e-mail (voice-activated e-mail) - Voice-enabled e-mail (sometimes referred to as voice-activated e-mail) uses voice recognition and speech synthesis technologies to enable users to access their e-mail from any telephone.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • Wayback Machine - The Wayback Machine is a Web site that enables anyone to see what a particular Web site looked like at some time in the past - from 1996 to the present.
  • Web 2.0 - Web 2.0 are websites and applications that make use of user-generated content for end-users.
  • Web 3.0 - Web 3.0 is the third generation of internet services for websites and applications that will focus on using a machine-based understanding of data to provide a data-driven and semantic web.
  • Web analytics - Web analytics is the process of analyzing the behavior of visitors to a Web site.
  • web application development - Web app development is the creation of application programs that reside on remote servers and are delivered to the user’s device over the Internet.
  • Web bug (Web beacon) - A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior.
  • Web filter - A Web filter is a program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user.
  • Web mining - In customer relationship management (CRM), Web mining is the integration of information gathered by traditional data mining methodologies and techniques with information gathered over the World Wide Web.
  • Web ring (Webring) - A Web ring (or Webring) is a way of interlinking related Web sites so that you can visit each site one after the other, eventually (if you keep going) returning to the first Web site.
  • Web self-service - Web self-service is a type of electronic support (e-support) that allows customers and employees to access information and perform routine tasks over the Internet, without requiring any interaction with a representative of an enterprise.
  • Web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider’s web server for use by a client or other web-based programs.
  • Web texting - Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.
  • WebLogic - BEA Systems' WebLogic is a server software application that runs on a middle tier, between back-end databases and related applications and browser-based thin clients.
  • WebTV - WebTV, now owned by Microsoft, was one of the first entries in the much publicized convergence of the World Wide Web with television.
  • Weebly - Weebly is a freemium website creation and Web-hosting service.
  • Weebly for Education - Weebly for Education is a free website hosting provider for academics.
  • whack-a-mole - Whack-a-mole is the pursuit of a particular person known to have sent spam.
  • What is ERP? Guide to enterprise resource planning software - ERP, or enterprise resource planning, is modular software designed to integrate the main functions of an organization's business processes into a unified system.
  • whiteboard - A whiteboard is a non-electronic variation of the traditional "rewriteable" schoolroom blackboard, but is white instead of black and of a material that can be written on with colored markers (known as dry erase markers).
  • whitelist - A whitelist is a list of e-mail addresses or domain names from which an e-mail blocking program will allow messages to be received.
  • wiki - A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site.
  • Wikipedia - Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians.
  • WikiScanner - WikiScanner is a free, Web-based database application that tracks the source IP addresses of computers used to edit anonymous Wikipedia entries.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.

-ADS BY GOOGLE

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close