Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.
  • Millennials (Generation Y) - Millennials, also known as Generation Y, is a demographic that includes individuals who reached adulthood around the turn of the 21st century.
  • MIME (Multipurpose Internet Mail Extensions) - MIME, or Multipurpose Internet Mail Extensions, is an extension of the original email protocol.
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • Monster Worldwide - Monster Worldwide is an online recruiting company noted for its flagship Monster.
  • multi-channel network (MCN) - A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) is a communications technology developed by 3GPP (Third Generation Partnership Project) to enable the transmission of multimedia content via text message.
  • multisig (multisignature) - Multisig, also called multisignature, is the requirement for a transaction to have two or more signatures before it can be executed.
  • narrowband IoT (NB-IoT) - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol that uses low-power wide area network (LPWAN) technology.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • netizen - A netizen is a person who uses the internet, especially as a forum, for the expression of views and participation in political society.
  • Netscape - Netscape Communications Corporation ("Netscape") was a computer services company best known for its web browser, Navigator.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network slicing - Network slicing is a technique that creates multiple virtual networks on top of a shared physical network to provide greater flexibility in the use and allocation of network resources.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • non-fungible token (NFT) - A non-fungible token (NFT) is a unique cryptographic asset used to create and authenticate ownership of digital assets.
  • Nvidia Omniverse - Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial computing and physics-based workflows across Nvidia tools, third-party apps and AI services.
  • OAuth (Open Authorization) - OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • organic search results - Organic search results are the unpaid listings that appear on a search engine results page (SERP).
  • pagination - Pagination is the process of separating print or digital content into discrete pages.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - Peripheral Component Interconnect Express (PCIe or PCI-E) is a serial expansion bus standard for connecting a computer to one or more peripheral devices.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • persistent connection - A persistent connection, also known as an HTTP persistent connection, refers to a network communication channel that remains open for further HTTP requests and responses instead of closing after a single exchange.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • PHP (Hypertext Preprocessor) - PHP (Hypertext Processor) is a general-purpose scripting language and interpreter that is freely available and widely used for web development.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • point-of-presence (POP) - A point-of-presence (POP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.
  • polling (computing) - In computer science, polling or a polled operation denotes the process of repeatedly sampling the status of external devices by a client program.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
  • processing in memory (PIM) - Processing in memory, or PIM (sometimes called processor in memory), refers to the integration of a processor with Random Access Memory (RAM) on a single chip.
  • product development (new product development -- NPD) - Product development, also called new product management, is a series of steps that includes the conceptualization, design, development and marketing of newly created or newly rebranded goods or services.
  • proof of stake (PoS) - Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.
  • protocol data unit (PDU) - In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • quantum computing - Quantum computing is an area of study focused on the development of computer technologies based on the principles of quantum theory.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • qubit (short for quantum bit) - A qubit (short for quantum bit) is the basic unit of information in quantum computing and counterpart to the bit (binary digit) in classical computing.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • recommendation engine - A recommendation engine is a system that gives customers recommendations based upon their behavior patterns and similarities to people who might have shared preferences.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • Remote Procedure Call (RPC) - Remote Procedure Call (RPC) is a protocol that one program can use to request a service from a program located in another computer on a network without having to understand the network's details.
  • Request for Comments (RFC) - A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • search engine - A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria.
  • search engine marketing (SEM) - Search engine marketing (SEM) is a method of promotion and advertising to help companies' content rank higher among search engine traffic.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or keyword phrase query.
  • search string - A search string is the combination of text, numbers and sometimes special characters that a user enters into an application's search form to find specific types of information.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Semantic Web - The Semantic Web is a vision for linking data across webpages, applications and files.
  • session ID - A session ID, also called a session token, is a unique identifier that a web server assigns to a user for the duration of the current session.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
  • smart TV - A smart TV is a television that includes an internal processor and onboard storage and enables internet connectivity, similar to a smartphone or personal computer.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • social media metrics - Social media metrics are the various data points that enable a company to gauge the impact of social media activity on its revenues.
  • social media recruitment (social media recruiting) - Social media recruitment, or social media recruiting, is the process of using social media platforms to identify, engage and vet people the organization may want to hire.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • Starlink - Starlink is a satellite internet constellation system that aims to deliver global internet coverage.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • supercomputer - A supercomputer is a computer that performs at or near the highest operational rate for computers.
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
Networking
  • local area network (LAN)

    A local area network (LAN) is a group of computers and peripheral devices that are connected together within a distinct ...

  • TCP/IP

    TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

  • HR service delivery

    HR service delivery is a term used to explain how an organization's human resources department offers services to and interacts ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close