Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

JAR - SPI

  • JAR file (Java Archive) - A Java Archive, or JAR file, contains all of the various components that make up a self-contained, executable Java application, deployable Java applet or, most commonly, a Java library to which any Java Runtime Environment can link.
  • Joint Academic Network (JANET) - The Joint Academic Network (JANET) is an internal, high-speed computer network that links the U.
  • Keyhole Markup Language (KML) - Keyhole Markup Language (KML) is an XML-based markup language designed to annotate and overlay visualizations on various two-dimensional, Web-based online maps or three-dimensional Earth browsers (such as Google Earth).
  • Klez - Klez (pronounced KLEHZ) is an Internet worm that launches automatically when a user previews or reads an e-mail message containing Klez on a system that has not been patched for a vulnerability in Microsoft Internet Explorer mail clients.
  • knowledge base - In general, a knowledge base is a centralized repository for information: a public library, a database of related information about a particular subject, and whatis.
  • knowledge-based authentication (KBA) - In a KBA scheme, the user is asked to answer at least one "secret" question before being allowed to change account settings or reset a password.
  • Kubernetes - Kubernetes, also referred to as K8s, is an open source system used to manage Linux Containers across private, public and hybrid cloud environments.
  • LinkedIn - LinkedIn is a social networking site for the business community.
  • list server (mailing list server) - A list server (mailing list server) is a program that handles subscription requests for a mailing list and distributes new messages, newsletters, or other postings from the list's members to the entire list of subscribers as they occur or are scheduled.
  • LiveJournal - LiveJournal is a social media platform that allows users to keep a blog, journal or diary and share their interests with LiveJournal friends or communities around the world.
  • LMGTFY (Let Me Google That For You) - LMGTFY (Let Me Google That For You) is a website that creates a demonstration of how to conduct a user-specified Google search.
  • mail bomb - A mail bomb is a form of a denial-of-service (DoS) attack designed to overwhelm an inbox or inhibit a server by sending a massive number of emails to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • man-in-the-disk (MITD) attack - Man-in-the-disk (MITD) is an attack vector that allows an intruder to intercept and potentially alter data as it moves between Android external storage and an installed app.
  • managed service provider (MSP) - A managed service provider (MSP) is a third-party company that remotely manages a customer's information technology (IT) infrastructure and end-user systems.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • marketing automation - Marketing automation is a type of software that allows companies to effectively target customers with automated marketing messages across channels including email, websites, social media and text messages to generate sales leads.
  • messaging - In general, messaging (also called electronic messaging) is the creation, storage, exchange, and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data Interchange (EDI) over a communications network.
  • messaging server - A messaging server is a middleware program that handles messages that are sent for use by other programs using a messaging application program interface (API).
  • Metro apps - Metro apps are touch-screen-friendly apps written especially for Microsoft's WinRT programming interfaces.
  • micro app - A micro app is a small, mobile application that is designed to perform one, simple task.
  • microblogging - Microblogging is a web service that allows the subscriber to broadcast short messages to other subscribers of the service.
  • micropayment - A micropayment is an e-commerce transaction involving a very small sum of money in exchange for something made available online, such as an application download, a service or Web-based content.
  • Microsoft D - Microsoft D is an end-user programming language in development as part of the company's Oslo service-oriented architecture (SOA) initiative.
  • Microsoft Exchange Server - Microsoft Exchange Server is Microsoft's email, calendaring, contact, scheduling and collaboration platform.
  • middleware - Middleware is software that is used to bridge the gap between applications and other tools or databases.
  • Mobile Application Management (MAM) - Mobile application management (MAM) is software that secures and enables IT control over enterprise applications on end users' corporate and personal smartphones and tablets.
  • mobile browser - A mobile browser is one that is optimized for the small display screen and limited resources of a handheld computing device such as a smart phone.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • mobile content management - Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices.
  • mobile marketing - Mobile marketing is promotional activity designed for delivery to cell phones, smart phones and other handheld devices, usually as a component of a multi-channel campaign.
  • mobile payment (m-payment) - Mobile payment is a point-of-sale transaction made through a mobile device.
  • mobile search - Mobile search is the practice of querying a search engine from an Internet-connected handheld device, such as a smart phone.
  • Morphis - Morphis is a Java -based open source wireless transcoding platform from Kargo, Inc.
  • Mozilla - Mozilla was Netscape Communication's nickname for Navigator, its first Web browser, and the name of an open source public collaboration created to develop Navigator.
  • MUD (Multi-User Dungeon) - A MUD or Multi-User Dungeon is an inventively structured social experience on the Internet, managed by a computer program and often involving a loosely organized context or theme, such as a rambling old castle with many rooms or a period in national history.
  • multichannel marketing - Multichannel marketing refers to the practice by which companies interact with customers via multiple channels, both direct and indirect, in order to sell them goods and services.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) - sometimes called Multimedia Messaging System - is a communications technology developed by 3GPP (Third Generation Partnership Project) that allows users to exchange multimedia communications between capable mobile phones and other devices.
  • MySpace - MySpace is a social networking website.
  • NANDroid backup - NANDroid backups are typically created by Android device owners who have gained root access to their phone’s operating system in order to use aftermarket distributions of the Android OS.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • newsgroup - A newsgroup is a discussion about a particular subject consisting of notes written to a central Internet site and redistributed through Usenet, a worldwide network of news discussion groups.
  • online data backup (remote data backup) - Online data backup (remote data backup) is a method of off-site storage in which data is regularly backed up over a network on a remote server, typically hosted by a provider.
  • online file sharing service - An online file sharing service provides a way to store and access documents, data, photos and video in the cloud rather than storing the information locally on a device hard drive or removable media.
  • online mapping - Online mapping is the compilation and publication of Web sites that provide exhaustive graphical and text information in the form of maps and databases.
  • online service provider (OSP) - On the Internet, OSP (online service provider) has several different meanings.
  • OPAC (Online Public Access Catalog) - An OPAC (Online Public Access Catalog) is an online bibliography of a library collection that is available to the public.
  • OpenStack - OpenStack is a collection of open source software modules and tools that provide a framework to create and manage both public cloud and private cloud infrastructure.
  • Opera - Opera is a Web browser that provides some advantages over the two most popular browsers from Netscape and Microsoft.
  • Opt-In Email - Opt-in email is a Web marketing term for email that recipients have previously requested by signing up at a Web site or special ad banner.
  • PeopleSoft - PeopleSoft is an e-business software product line owned by Oracle.
  • Pepys' weblog - The famous diary that Samuel Pepys (pronounced PEEPS), once the head of England's Navy, kept during the years 1660-1669 is being made available online in the form of a weblog.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • podcasting - Podcasting is the preparation and distribution of audio files using RSS feeds to the computers or mobile devices of subscribed users.
  • POP3 (Post Office Protocol 3) - POP3 (Post Office Protocol 3) is the most recent version of a standard protocol for receiving e-mail.
  • presence technology - Presence technology is a type of application that makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network.
  • privacy policy - A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations.
  • progressive web app (PWA) - A progressive web app (PWA) is a website that looks and behaves as if it is a mobile app.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • remote-control software - Remote-control software is programming in a central or server computer that is used to control other computers (or their users) at a distance, either under the control of an administrator or at the request of the user.
  • responsive design - Responsive design is an approach to web page creation that makes use of flexible layouts, flexible images and cascading style sheet media queries.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services.
  • REST API (RESTful API) - A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • role-playing game (RPG) - A role-playing game (RPG) is a game in which each participant assumes the role of a character, generally in a fantasy or science fiction setting, that can interact within the game's imaginary world.
  • runbook - Runbooks are a set of standardized written procedures for completing repetitive IT processes within a company.
  • Samba - Samba is a popular freeware program that allows end users to access and use files, printers, and other commonly shared resources on a company's intranet or on the Internet.
  • Same Origin Policy (SOP) - The Same Origin Policy (SOP), also called Single Origin Policy, is a security measure used in Web browser programming languages such as JavaScript and Ajax to protect the confidentiality and integrity of information.
  • SAP BW (Business Warehouse) - SAP Business Warehouse (BW) is a model-driven data warehousing product based on the SAP NetWeaver ABAP platform.
  • SAP ERP Central Component (SAP ECC) - SAP ERP Central Component (SAP ECC) is an on-premises enterprise resource planning (ERP) system.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • scumware - Scumware is any programming that gets on your computer from Internet sites without your consent and often without your knowledge.
  • search engine - A search engine is a program that gathers information (web pages) in a database and provides relevant results to user keyword queries.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or phrase query.
  • searching - On the Internet, searching is just trying to find the information you need.
  • Security as a Service (SaaS) - Security-as-a-service (SaaS) is an outsourcing model for security management.
  • Sender Policy Framework (SPF) - Sender Policy Framework (SPF) is a protocol designed to restrict who can use an organization's domain as the source of an email message.
  • service-component architecture (SCA) - Service-component architecture (SCA) is a group of specifications intended for the development of applications based on service-oriented architecture (SOA), which defines how computing entities interact to perform work for each other.
  • SGML (Standard Generalized Markup Language) - SGML (Standard Generalized Markup Language) is a standard for how to specify a document markup language or tag set.
  • signature file - A signature file is a short text file you create for use as a standard appendage at the end of your e-mail notes or Usenet messages.
  • site map - A site map is a visual or textually organized model of a Web site's content that allows the users to navigate through the site to find the information they are looking for, just as a traditional geographical map helps people find places they are looking for in the real world.
  • Skype - Skype is an Internet telephony service provider that offers free calling between computers and low-cost calling to regular telephones that aren't connected to the Internet.
  • smart card - A smart card is a physical card that has an embedded integrated chip that acts as a security token.
  • smart home or building (home automation or domotics) - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart wristwatch - A smart wristwatch is a wristwatch that not only tells time but, using a wireless connection to an information source, can show you the news, stock, sports scores, or weather; remind you of meetings on your Outlook calendar; provide instant messaging input from others; and update the time when you move to another time zone.
  • smiley - In Internet e-mail messages and Web discussions, a smiley is a sequence of typed characters that graphically produces the sideways image of someone smiling, like this::-)The first use of a smiley is currently attributed to Scott E.
  • SMTP (Simple Mail Transfer Protocol) - SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
  • snail mail - Snail mail is a slang term for the regular postal service (for example, the U.
  • social computing - Social computing is the collaborative and interactive nature of online behavior.
  • social graph - A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network.
  • social networking - Social networking is the practice of using a dedicated online platform to maintain contacts, interact and collaborate with like-minded individuals, peers, friends and family.
  • Software as a Service BI (SaaS BI) - Software as a Service business intelligence (SaaS BI) is a delivery model for business intelligence in which applications are typically deployed outside of a company’s firewall at a hosted location.
  • Solidity - Solidity is a programming language used for developing smart contracts on Ethereum and other blockchain platforms, such as Monax and its Hyperledger Burrow blockchain.
  • spam filter - A spam filter is a program used to detect unsolicited, unwanted and virus-infected emails and prevent those messages from getting to a user's inbox.
  • spam trap - A spam trap is an email address that is used to identify and monitor spam email.
  • spambot - A spambot is a program designed to collect, or harvest, e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail, also known as spam.
  • spear phishing - Spear phishing is a malicious email spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information.
  • spim (instant messaging spam) - Spim is spam delivered through instant messaging (IM) instead of through e-mail messaging.
  • SPIT (spam over Internet telephony) - SPIT (spam over Internet telephony), sometimes known as vam (voice or VoIP spam), is unsolicited bulk messages broadcast over VoIP (Voice over Internet Protocol) to phones connected to the Internet.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close