Browse Definitions :
Definition

at sign (address sign or @)

What is an at sign?

On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an E-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected].

In business, @ is a symbol meaning "at" or "each." For example, it means "each" in "4 apples @ $.35 = $1.40." Perhaps because it was one of the standard characters designed into typewriters (usually with the upper shift key pressed), the @ was chosen for inclusion as one of the special characters in the ASCII set of characters that became standard for computer keyboards, programs, and online message transmission.

History of the at sign

In July, 1972, as the specifications for the File Transfer Protocol (FTP) were being written, someone suggested including some e-mail programs written by Ray Tomlinson, an engineer at Bolt Beranek and Newman, chief contractor on ARPANET (Advanced Research Projects Agency Network), the precursor of the Internet. In their book, Where Wizards Stay Up Late, Katie Hafner and Matthew Lyon describe how the @ sign got there:

Tomlinson....became better known for a brilliant (he called it obvious) decision he made while writing [the e-mail] programs. He needed a way to separate, in the e-mail address, the name of the user from the machine the user was on. How should that be denoted? He wanted a character that would not, under any circumstances, be found in the user's name. He looked down at the keyboard he was using, a Model 33 Teletype, which almost everyone else on the Net used, too. In addition to the letters and numerals there were about a dozen punctuation marks. "I got there first, so I got to choose any punctuation I wanted," Tomlinson said. "I chose the @ sign." The character also had the advantage of meaning "at" the designated institution. He had no idea he was creating an icon for the wired world.

This was last updated in October 2021
Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

  • virtual agent

    A virtual agent -- sometimes called an intelligent virtual agent (IVA) -- is a software program or cloud service that uses ...

  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

Close