Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.
  • Google Bigtable - Google Bigtable is a distributed, column-oriented data store created by Google Inc.
  • Google Chrome browser - Google Chrome browser is a free web browser used for accessing the internet and running web-based applications.
  • Google ChromeOS - Google ChromeOS, formerly Chrome OS, is a lightweight operating system (OS) built on ChromiumOS, an open source OS that shares the same code base as ChromeOS.
  • Google Cloud Composer - Cloud Composer is a managed workflow orchestration service that is built on Apache Airflow.
  • Google Cloud Key Management Service (KMS) - Google Cloud Key Management Service (KMS) is a cloud service for managing encryption keys for other Google cloud services that enterprises can use to implement cryptographic functions.
  • Google Cloud operations (formerly Stackdriver) - Google Stackdriver was a monitoring service that provided IT teams with performance data about applications and virtual machines (VMs) running on the Google Cloud Platform (GCP) and Amazon Web Services public cloud.
  • Google Cloud Storage - Google Cloud Storage is an enterprise public cloud storage platform that can house large unstructured data sets.
  • Google Compute Engine - Google Compute Engine (GCE) is an infrastructure as a service (IaaS) offering that allows clients to run workloads on Google's physical hardware.
  • Google Docs - Google Docs, first released in 2006, is a free web-based word processor in which documents can be created, edited and stored as part of the Google Docs Editors suite of free web applications.
  • Google Firebase - Google Firebase is a set of cloud-based development tools that helps mobile app developers build, deploy and scale their apps.
  • Google Glass - Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
  • Google Hangouts - Google Hangouts is a unified communications service that allows members to initiate and participate in text, voice or video chats, either one-on-one or in a group.
  • Google Kubernetes Engine (GKE) - Google Kubernetes Engine (GKE) is a managed Kubernetes service for containers and container clusters running on Google Cloud infrastructure.
  • Google Maps - Google Maps is a web-based service that provides detailed information about geographical regions and sites worldwide.
  • Google Mobile Services (GMS) - Google Mobile Services (GMS) is a collection of applications and application programming interfaces (APIs) developed by Google for manufacturers of Android devices, such as smartphones and tablets.
  • Google Pay (Android Pay) - Google Pay is the search company’s electronic wallet and payment service offering.
  • Google Play Protect - Google Play Protect is a malware protection and detection service built into Android devices that use Google Mobile Services.
  • Google Sheets - Google Sheets is a web-based application that enables users to create, update and modify spreadsheets and share the data live online.
  • Google Street View - Google Street View is a feature of Google Maps that enables users to view and navigate through 360 degree horizontal and 290 degree vertical panoramic street level images of various cities around the world.
  • Google Transfer Appliance - Google Transfer Appliance is a high-capacity storage server that enables enterprises to transport large volumes of data to Google Cloud Storage.
  • Google Trends - Google Trends is a free service provided by Google that displays how often specific keywords, subjects and phrases have been searched for on Google over a period of time.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) was a Google social networking platform discontinued for personal use in 2019.
  • grid computing - Grid computing is a system for connecting a large number of computer nodes into a distributed architecture that delivers the compute resources necessary to solve complex problems.
  • hamburger icon (slide drawer navigation) - A hamburger icon is a navigational symbol in user interface (UI) design.
  • hosting (website hosting, web hosting and webhosting) - Web hosting -- also known as website hosting or webhosting -- is the process where a web hosting provider stores and maintains website files and applications on a server to make its customers' websites accessible on the internet.
  • HTML5 - HTML5 is commonly thought to be the fifth version, or release, of the Hypertext Markup Language (HTML), a standardized descriptive language that specifies how to structure webpages.
  • IDoc (intermediate document) - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • Instagram Stories - Instagram Stories is a feature within the Instagram app where users can capture and post related images and video content in a slideshow format.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a standalone application or embedded software.
  • integration - Integration is the act of bringing together smaller components or information stored in different subsystems into a single functioning unit.
  • integration as a service (IaaS) - Integration as a service (IaaS) is a cloud-based delivery model that strives to connect on-premises data with data located in cloud-based applications.
  • integration server - An integration server is a type of computer server that facilitates the interaction between different operating systems (OSes), services and applications across an enterprise IT environment.
  • interactive voice response (IVR) - Interactive voice response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
  • Internet Explorer (IE) - Internet Explorer (IE) is a web browser that formerly came bundled with the Microsoft Windows operating system.
  • IP address (Internet Protocol address) - Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • Joint Academic Network (JANET) - The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.
  • knowledge base - In general, a knowledge base is a centralized repository of information.
  • Kubernetes - Kubernetes, also referred to as K8s for the number of letters between K and S, is an open source platform used to manage containerized applications across private, public and hybrid cloud environments.
  • Lightning (Salesforce Lightning) - Lightning (Salesforce Lightning) is a component-based framework for Salesforce app development.
  • LinkedIn - LinkedIn is a social networking site designed specifically for the business community.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • micro app - A micro app is a small, mobile application that is designed to perform one, simple task.
  • microblogging - Microblogging is a short blog post designed for quick and typically direct audience interactions.
  • Microsoft D - Microsoft D is an end-user programming language in development as part of the company's Oslo service-oriented architecture (SOA) initiative.
  • Microsoft Exchange Server - Microsoft Exchange Server is Microsoft's email, calendaring, contact, scheduling and collaboration platform.
  • middleware - Middleware is software that is used to bridge the gap between applications and operating systems.
  • mobile application management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • multichannel marketing - Multichannel marketing refers to the practice of companies interacting with customers via multiple channels, both direct and indirect, to sell them goods and services.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) is a communications technology developed by 3GPP (Third Generation Partnership Project) to enable the transmission of multimedia content via text message.
  • Multiple Document Interface (MDI) - Multiple Document Interface (MDI) is a Microsoft Windows programming interface for creating an application that enables users to work with multiple documents simultaneously.
  • Netscape - Netscape Communications Corporation ("Netscape") was a computer services company best known for its web browser, Navigator.
  • newsgroup - A newsgroup is an online discussion forum where users can post messages, exchange ideas and read the comments of others.
  • OPAC (Online Public Access Catalog) - An OPAC (Online Public Access Catalog) is an online bibliography of a library collection that is available to the public.
  • OpenStack - OpenStack is a collection of open source software modules and tools that provides organizations with a framework to create and manage both public cloud and private cloud infrastructure.
  • Opera - Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • podcasting - Podcasting is the preparation and distribution of audio files using RSS feeds to the computers or mobile devices of subscribed users.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • privacy policy - A privacy policy is a legal document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST API (RESTful API) - A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character that can interact within the game's imaginary world.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • SAP ERP Central Component (SAP ECC) - SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • search engine - A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or keyword phrase query.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving email.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social network - A social network is a website or app that lets people connect with each other on a common platform.
  • social networking - Social networks are websites and apps that allow users and organizations to connect, communicate, share information and form relationships.
  • software package - A software package is a group of programs bundled together into a product suite.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is an automated system that sends unwanted, unsolicited messages to users, known as spam.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • SQL injection (SQLi) - A SQL injection (SQLi) is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is a systematic approach to evaluating and partnering with vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success, and developing strategies to improve their performance.
  • telematics - Telematics is a term that combines the words telecommunications and informatics to describe the use of communications and IT to transmit, store and receive information from devices to remote objects over a network.
  • Telnet - Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based communication channel between two machines.
Networking
  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

Security
  • virus (computer virus)

    A computer virus is a type of malware that attaches itself to a program or file. A virus can replicate and spread across an ...

  • Certified Information Security Manager (CISM)

    Certified Information Security Manager (CISM) is an advanced certification that indicates that an individual possesses the ...

  • cryptography

    Cryptography is a method of protecting information and communications using codes, so that only those for whom the information is...

CIO
  • IT project management

    IT project management is the process of planning, organizing and delineating responsibility for the completion of an ...

  • chief financial officer (CFO)

    A chief financial officer (CFO) is the corporate title for the person responsible for managing a company's financial operations ...

  • chief strategy officer (CSO)

    A chief strategy officer (CSO) is a C-level executive charged with helping formulate, facilitate and communicate an ...

HRSoftware
  • HR automation

    Human resources automation (HR automation) is a method of using software to automate and streamline repetitive and laborious HR ...

  • compensation management

    Compensation management is the discipline and process for determining employees' appropriate pay and benefits.

  • HR technology (human resources tech)

    HR technology (human resources technology) is an umbrella term for hardware and software used to automate the human resource ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close