Browse Definitions :

Internet applications

This glossary contains definitions related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce and cloud computing.

SPI - YAH

  • SQL injection - A SQL injection is a technique that attackers use to gain unauthorized access to a web application database by adding a string of malicious code to a database query.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • storage at the edge - Storage at the edge is the collective methods and technologies that capture and retain digital information at the periphery of the network, as close to the originating source as possible.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks -- and unavailable to other entities.
  • supplier relationship management (SRM) - Supplier relationship management (SRM) is the systematic approach to evaluating vendors that supply goods, materials and services to an organization, determining each supplier's contribution to success and developing strategies to improve their performance.
  • tabbed browsing - Tabbed browsing, also called a tabbed document interface (TDI), is a feature recently implemented in Web browsers to effectively contain multiple pages or documents in a single window.
  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • telematics - Telematics uses GPS and mobile devices to send and receive information that helps control remote objects, primarily in the automotive industry.
  • Telnet - Telnet is a network protocol used to virtually access a computer and to provide a two-way, collaborative and text-based communication channel between two machines.
  • Text message abbreviations and acronyms - This handy fast reference will help you quickly understand hundreds of Text, Twitter and Chat abbreviations and acronyms that are popularly used in text messages and social media.
  • thumbnail - A thumbnail is a small image representation of a larger image, usually intended to make it easier and faster to look at or manage a group of larger images.
  • Top 10 spyware threats - The top 10 spyware list describes the 10 common spyware threats behind famous spyware attacks and is frequently identified by Webroot's Spy Audit, a free spyware scanner tool.
  • Total Quality Management (TQM) - Total Quality Management is a management framework based on the belief that an organization can build long-term success by having all its members, from low-level workers to its highest ranking executives, focus on quality improvement and, thus, delivering customer satisfaction.
  • Tumblr - Tumblr is a free microblogging site.
  • tweet - A tweet is a post on Twitter.
  • tweetchat - A tweetchat, also called a tweet jam, is a discussion carried out on Twitter.
  • Twitter - Twitter is a free social networking site where users broadcast short posts known as tweets.
  • URL shortening - URL shortening is the translation of a long Uniform Resource Locator (URL) into an abbreviated alternative that redirects to the longer URL.
  • Ustream - Ustream is an online video service provider that enables anybody with a camera and Internet connection to conduct a live interactive video broadcast to a global audience from anywhere in the world.
  • value chain - A value chain is a concept describing the full chain of a business's activities in the creation of a product or service -- from the initial reception of materials all the way through its delivery to market, and everything in between.
  • vCard - A vCard is an electronic business (or personal) card and also the name of an industry specification for the kind of communication exchange that is done on business or personal cards.
  • Vimeo - Vimeo is a U.
  • virtual call center - A virtual call center -- or virtual contact center (VCC) -- is a call center in which the organization's representatives are geographically dispersed, rather than situated at workstations in one location.
  • virtual classroom - A virtual classroom is an online learning environment.
  • virtual network adapter - A virtual network adapter is software that operates like a physical network adapter within the host operating system (OS) or through an application installed on the endpoint or server.
  • virtual trade shows - A virtual trade show is an online version of an event at which goods and services for a specific industry are exhibited and demonstrated.
  • VKontakte (VK) - VKontakte (VK) is Europe's largest social networking website, with more than 100 million users.
  • vlog (video blog) - A vlog (or video blog) is a blog that contains video content.
  • voice search - Voice search is a speech recognition technology that allows users to search by saying terms aloud rather than typing them into a search field.
  • voice user interface (VUI) - Voice user interface (VUI) is speech recognition technology that allows people to interact with a computer, smartphone or other device through voice commands.
  • Vonage - Vonage is a communication platform as a service (CPaaS) provider for consumers and businesses that makes it possible for customers to connect and communicate on any device through cloud-hosted voice, video, chat and short message service (SMS).
  • Web 2.0 - Web 2.0 are websites and applications that make use of user-generated content for end-users.
  • Web 3.0 (Web3) - Web 3.0 (Web3) is the third generation of the evolution of web technologies.
  • web analytics - Web analytics is the process of analyzing the behavior of visitors to a website.
  • web application development - Web app development is the creation of application programs that reside on remote servers and are delivered to the user’s device over the Internet.
  • Web bug (Web beacon) - A Web bug, also known as a Web beacon, is a file object (usually a graphic image such as a transparent GIF) that is placed on a Web page or in an e-mail message to monitor user behavior.
  • Web self-service - Web self-service is a type of electronic support (e-support) that allows customers and employees to access information and perform routine tasks over the Internet, without requiring any interaction with a representative of an enterprise.
  • web services - Web services are a type of internet software that use standardized messaging protocols and are made available from an application service provider's web server for use by a client or other web-based programs.
  • Web texting - Web texting is two-way text messaging from the Web to a handheld mobile device, usually a cellular phone.
  • WebLogic - Oracle WebLogic Server is a leading e-commerce online transaction processing (OLTP) platform, developed to connect users in distributed computing production environments and to facilitate the integration of mainframe applications with distributed corporate data and applications.
  • WebTV - WebTV, now owned by Microsoft, was one of the first entries in the much publicized convergence of the World Wide Web with television.
  • Weebly - Weebly is a freemium website creation and Web-hosting service.
  • What is hybrid cloud? Everything you need to know - A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between these platforms.
  • whitelist (allowlist) - A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others.
  • wiki - A wiki (sometimes spelled "Wiki") is a server program that allows users to collaborate in forming the content of a Web site.
  • Wikipedia - Wikipedia is a free, open content online encyclopedia created through the collaborative effort of a community of users known as Wikipedians.
  • Windows Sharepoint Services (WSS) - Windows Sharepoint Services (WSS) is a portal-based platform for creating, managing and sharing documents and customized Web services.
  • wireless router - A wireless router is a device in a WLAN (wireless local area network) that determines the next network point to which a packet should be forwarded toward its destination.
  • workaround - A workaround is a method, sometimes used temporarily, for achieving a task or goal when the usual or planned method isn't working.
  • WS-AtomicTransaction (WS-AT) - WS-AtomicTransaction, also called Web Services Atomic Transaction or WS-AT, is a specification that defines how single transactions are carried out based on WS-Coordination and WS-Transaction, companion specifications for information exchange in business processes.
  • XACML (Extensible Access Control Markup Language) - XACML (Extensible Access Control Markup Language) is an attribute-based access control policy language (ABAC) or XML-based language, designed to express security policies and access requests to information.
  • XSL (Extensible Stylesheet Language) - XSL (Extensible Stylesheet Language), formerly called Extensible Style Language, is a language for creating a style sheet that describes how data sent over the Web using the Extensible Markup Language (XML) is to be presented to the user.
  • Yahoo - Yahoo! is an Internet portal that incorporates a search engine and a directory of World Wide Web sites organized in a hierarchy of topic categories.
SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • resource allocation

    Resource allocation is the process of assigning and managing assets in a manner that supports an organization's strategic ...

  • chief digital officer (CDO)

    A chief digital officer (CDO) is charged with helping an enterprise use digital information and advanced technologies to create ...

  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close