Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.
  • MIME (Multipurpose Internet Mail Extensions) - MIME, or Multipurpose Internet Mail Extensions, is an extension of the original email protocol.
  • mob mentality (herd/hive mentality) - Mob mentality -- also called herd or hive mentality -- is the inclination that some humans have to be part of a large group, often neglecting their individual feelings in the process, and adopting the behaviors and actions of the people around them.
  • mobile computing - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • Monster Worldwide - Monster Worldwide is an online recruiting company noted for its flagship Monster.
  • multi-channel network (MCN) - A multi-channel network (MCN) is a company or entity that works with multiple channels and content creators, consulting or assisting towards success on streaming video platforms such as YouTube.
  • Multimedia Messaging Service (MMS) - Multimedia Messaging Service (MMS) is a communications technology developed by 3GPP (Third Generation Partnership Project) to enable the transmission of multimedia content via text message.
  • multisig (multisignature) - Multisig, also called multisignature, is the requirement for a transaction to have two or more signatures before it can be executed.
  • narrowband IoT (NB-IoT) - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol that uses low-power wide area network (LPWAN) technology.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • netizen - A netizen is a person who uses the internet, especially as a forum, for the expression of views and participation in political society.
  • Netscape - Netscape Communications Corporation ("Netscape") was a computer services company best known for its web browser, Navigator.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network slicing - Network slicing is a technique that creates multiple virtual networks on top of a shared physical network to provide greater flexibility in the use and allocation of network resources.
  • newsfeed - A news feed (newsfeed) is list of newly published content on a website.
  • non-fungible token (NFT) - A non-fungible token (NFT) is a unique cryptographic asset used to create and authenticate ownership of digital assets.
  • Nvidia Omniverse - Nvidia Omniverse is a computing platform built to enhance digital design and development by integrating 3D design, spatial computing and physics-based workflows across Nvidia tools, third-party apps and AI services.
  • OAuth (Open Authorization) - OAuth (Open Authorization) is an open standard authorization framework for token-based authorization on the internet.
  • operating system (OS) - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer.
  • organic search results - Organic search results are the unpaid listings that appear on a search engine results page (SERP).
  • pagination - Pagination is the process of separating print or digital content into discrete pages.
  • peer-to-peer (P2P) - Peer-to-peer (P2P) is a decentralized communications model in which each party has the same capabilities and either party can initiate a communication session.
  • pegged cryptocurrency - A pegged cryptocurrency is a cryptocurrency whose value is linked to a specific bank-issued currency, financial instrument or tradable commodity.
  • Peripheral Component Interconnect Express (PCIe, PCI-E) - Peripheral Component Interconnect Express (PCIe or PCI-E) is a serial expansion bus standard for connecting a computer to one or more peripheral devices.
  • Perl - Perl is a family of script programming languages that is similar in syntax to the C language.
  • persistent connection - A persistent connection, also known as an HTTP persistent connection, refers to a network communication channel that remains open for further HTTP requests and responses instead of closing after a single exchange.
  • pharming - Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • phishing kit - A phishing kit is a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit.
  • PHP (Hypertext Preprocessor) - PHP (Hypertext Processor) is a general-purpose scripting language and interpreter that is freely available and widely used for web development.
  • phubbing - Phubbing, a contraction of the words “phone snubbing,” is the act of ignoring a companion in favor of using a smartphone.
  • ping - A ping (Packet Internet or Inter-Network Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address exists and can accept requests in computer network administration.
  • point-of-presence (POP) - A point-of-presence (POP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.
  • polling (computing) - In computer science, polling or a polled operation denotes the process of repeatedly sampling the status of external devices by a client program.
  • pop-up shop - A pop-up shop is a temporary retail space that is typically used to introduce a new product line, test a new market or generate awareness for a product or cause.
  • port number - Port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • portal - Portal is a term, generally synonymous with gateway, for a World Wide Web site that is or proposes to be a major starting site for users when they get connected to the Web or that users tend to visit as an anchor site.
  • principle of least privilege (POLP) - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
  • processing in memory (PIM) - Processing in memory, or PIM (sometimes called processor in memory), refers to the integration of a processor with Random Access Memory (RAM) on a single chip.
  • product development (new product development) - Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, development and marketing of newly created or rebranded goods and services.
  • proof of stake (PoS) - Proof of stake (PoS) is an approach used in the cryptocurrency industry to help validate transactions.
  • protocol data unit (PDU) - In networking, a protocol data unit is the basic unit of exchange between entities that communicate using a specified networking protocol.
  • push (or server-push) - Push (or "server-push") is the delivery of information on the Web that is initiated by the information server rather than by the information user or client, as it usually is.
  • quantum computing - Quantum computing is an area of computer science focused on the development of computers based on the principles of quantum theory.
  • quantum internet - The quantum internet is a theoretical system of interconnected quantum computers that uses quantum signals to send information rather than radio waves.
  • qubit (short for quantum bit) - A qubit (short for quantum bit) is the basic unit of information in quantum computing and counterpart to the bit (binary digit) in classical computing.
  • Real-time Transport Protocol (RTP) - Real-time Transport Protocol (RTP) is a network standard designed for transmitting audio or video data that is optimized for consistent delivery of live data.
  • recommendation engine - A recommendation engine is a system that gives customers recommendations based upon their behavior patterns and similarities to people who might have shared preferences.
  • Reddit - Reddit is a social news website and forum where content is socially curated and promoted by site members through voting.
  • remote deposit capture (RDC) - Remote deposit capture (RDC) is a system that allows a customer to scan checks remotely and transmit the check images to a bank for deposit, usually via an encrypted Internet connection.
  • remote desktop - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • Remote Procedure Call (RPC) - A Remote Procedure Call (RPC) is a software communication protocol that one program uses to request a service from another program located on a different computer and network, without having to understand the network's details.
  • Request for Comments (RFC) - A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.
  • REST (REpresentational State Transfer) - REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other.
  • RFM analysis (recency, frequency, monetary) - RFM analysis is a marketing technique used to quantitatively rank and group customers based on the recency, frequency and monetary total of their recent transactions to identify the best customers and perform targeted marketing campaigns.
  • Rich Internet Application (RIA) - A rich Internet application (RIA) is a Web application designed to deliver the same features and functions normally associated with deskop applications.
  • rich presence technology (RPT) - Rich presence is an enhanced form of presence awareness in which participants can determine if other users are online and if so, observe to a limited extent what they are doing and how they are doing it.
  • RickRoll - On the Internet, a RickRoll is a prank where a visitor who clicks on a specific link is intentionally misdirected to a video of pop star Rick Astley's hit "Never Gonna Give You Up.
  • Rijndael - Rijndael (pronounced rain-dahl) is an Advanced Encryption Standard (AES) algorithm.
  • Robert Metcalfe - Robert 'Bob' Melancton Metcalfe, born April 7, 1946, is an American engineer, entrepreneur, professor, writer and venture capitalist.
  • route summarization (route aggregation) - Route summarization -- also known as route aggregation -- is a method to minimize the number of routing tables in an Internet Protocol (IP) network.
  • Routing Information Protocol (RIP) - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • routing table - A routing table is a set of rules, often viewed in table format, that's used to determine where data packets traveling over an Internet Protocol (IP) network will be directed.
  • SAP NetWeaver - SAP NetWeaver is a technology platform that allows organizations to integrate data, business processes, elements and more from a variety of sources into unified SAP environments.
  • search engine - A search engine is a coordinated set of programs that searches for and identifies items in a database that match specified criteria.
  • search engine marketing (SEM) - Search engine marketing (SEM) is a method of promotion and advertising to help companies' content rank higher among search engine traffic.
  • search engine results page (SERP) - A search engine results page (SERP) is the list of results that a search engine returns in response to a specific word or keyword phrase query.
  • search operator - A search operator -- sometimes referred to as a search parameter -- is a character or string of characters used in a search engine query to narrow the focus of the search.
  • search string - A search string is the combination of text, numbers and sometimes special characters that a user enters into an application's search form to find specific types of information.
  • Secure Shell (SSH) - SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
  • Semantic Web - The Semantic Web is a vision for linking data across webpages, applications and files.
  • session ID - A session ID, also called a session token, is a unique identifier that a web server assigns to a user for the duration of the current session.
  • Session Initiation Protocol (SIP) - Session Initiation Protocol (SIP) is a signaling protocol used for initiating, maintaining, modifying and terminating real-time sessions that involve video, voice, messaging and other communications applications and services between two or more endpoints on IP networks.
  • shadow banning (shadowban) - Shadow banning, in discussion forums and social media, is the practice of making a particular user's posts visible only to that user.
  • sharing economy - The sharing economy, also known as collaborative consumption or peer-to-peer-based sharing, is a concept that highlights the ability -- and perhaps the preference -- of individuals to rent or borrow goods rather than buy and own them.
  • short message service center (SMSC) - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • six degrees of separation - Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries.
  • Skinny Client Control Protocol (SCCP) - Skinny Client Control Protocol (SCCP) is a Cisco proprietary standard for terminal control for use with voice over IP (VoIP).
  • smart home - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • smart streetlight - A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
  • smart TV - A smart TV is a television that includes an internal processor and onboard storage and enables internet connectivity, similar to a smartphone or personal computer.
  • Snapchat dysmorphia - Snapchat dysmorphia is a body-image disorder characterized by the need to heavily edit one's own digital image.
  • SOAP (Simple Object Access Protocol) - SOAP (Simple Object Access Protocol) is a message protocol that enables the distributed elements of an application to communicate.
  • social media marketing (SMM) - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • social media metrics - Social media metrics are the various data points that enable a company to gauge the impact of social media activity on its revenues.
  • social media recruitment (social media recruiting) - Social media recruitment, or social media recruiting, is the process of using social media platforms to identify, engage and vet people the organization may want to hire.
  • SODOTO (See One, Do One, Teach One) - SODOTO (See One, Do One, Teach One) is a methodology of teaching and learning skills and best practices through direct observation of a task, hands-on practical experience performing the task and teaching the task to another person.
  • soft reset - A soft reset is a restart of a device, such as a smartphone, tablet, laptop or personal computer (PC).
  • softphone (soft client telephone) - A softphone (software telephone) is an application program that enables voice over Internet Protocol (VoIP) telephone calls from computing devices.
  • Squid proxy server - Squid is a Unix-based proxy server that caches Internet content closer to a requestor than its original point of origin.
  • Starlink - Starlink is a satellite internet constellation system that aims to deliver global internet coverage.
  • stateful inspection - Stateful inspection, also known as dynamic packet filtering, is a firewall technology that monitors the state of active connections and uses this information to determine which network packets to allow through the firewall.
  • static IP address - A static IP address is a 32 bit number that is assigned to a computer to be its address on the internet.
  • steampunk - Steampunk is a design style inspired by Victorian-era industrialism.
  • storage security - Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted networks and unavailable to other entities.
  • Stream Control Transmission Protocol (SCTP) - Stream Control Transmission Protocol (SCTP) is a connection-oriented network protocol for transmitting multiple streams of data simultaneously between two endpoints that have established a connection in a network.
  • Sun Microsystems - Sun Microsystems (often just called "Sun"), the leading company in computers used as Web servers, also makes servers designed for use as engineering workstations, data storage products, and related software.
  • supercomputer - A supercomputer is a computer that performs at or near the highest operational rate for computers.
  • SYN flood attack - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • TCP/IP - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • time-to-live (TTL) - Time-to-live (TTL) is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded.
Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

  • What is security information and event management (SIEM)?

    Security information and event management (SIEM) is an approach to security management that combines security information ...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • contact center agent (call center agent)

    A contact center agent is a person who handles incoming or outgoing customer communications for an organization.

  • contact center management

    Contact center management is the process of overseeing contact center operations with the goal of providing an outstanding ...

  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

Close