Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.
  • WebRTC (Web Real-Time Communications) - WebRTC (Web Real-Time Communications) is an open source project that enables real-time voice, text and video communications capabilities between web browsers and devices.
  • What are customer service and support? - Customer service is the support organizations offer to customers before, during and after purchasing a product or service.
  • What are Internet data caps and why do providers use them? - A data cap, also known as a bandwidth cap, is a limit that service providers impose on the amount of data a user account can transfer at a specified level of throughput over a given time period, for a specified fee.
  • What are port numbers and how do they work? - A port number is a way to identify a specific process to which an internet or other network message is to be forwarded when it arrives at a server.
  • What are quantum coherence and decoherence? - Quantum coherence and decoherence are fundamental indications of how well a system of quantum objects -- atoms or other quantum particles -- maintains its relationships and how reliably the ongoing operation of that quantum system can be predicted over time.
  • What are social media metrics? - Social media metrics are the various data points that can help a company gauge the impact of social media activity on its revenue.
  • What are systems of engagement? - Systems of engagement are decentralized IT components that incorporate technologies such as social media and the cloud to encourage and enable peer interaction.
  • What are the top 10 spyware threats? - The top 10 spyware list describes the most common spyware threats behind famous spyware attacks and is frequently identified by leading antispyware tools from vendors like Webroot, Norton and Malwarebytes.
  • What are vector embeddings? - Vector embeddings are numerical representations that capture the relationships and meaning of words, phrases and other data types.
  • What is 3PL (third-party logistics)? - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • What is a bitcoin address? - A bitcoin address is a unique identifier that serves as a virtual location where the cryptocurrency can be sent during digital cryptotransactions.
  • What is a certificate authority (CA)? - A certificate authority (CA) is a trusted entity that issues digital certificates to authenticate content sent from web servers.
  • What is a channel partner? - A channel partner is a person or organization that partners with a manufacturer or producer to market, sell, and deliver their products or services to the end customer.
  • What is a cloud access security broker (CASB)? - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • What is a Consensus Algorithm? - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • What is a content management system (CMS)? - A content management system (CMS) is a software application that lets users create, edit, collaborate on, publish and store digital content.
  • What is a cookie? - A cookie is a text file carrying some information that a website places on a user's computer.
  • What is a headless content management system (headless CMS)? - A headless content management system (CMS) is an application in which the content and presentation layers are decoupled, allowing for faster content creation, edits and deployments.
  • What is a host (in computing)? - A host is a computer or other device that communicates with other hosts on a network.
  • What is a mobile VPN? - A mobile virtual private network (mobile VPN) is a type of VPN specifically designed to maintain a stable and secure connection while a user moves across different networks.
  • What is a point of presence (PoP)? - A point of presence (PoP) is a point or physical location where two or more networks or communication devices build a connection from one place to the rest of the internet.
  • What is a protocol data unit (PDU)? - A protocol data unit (PDU) is the basic unit of exchange between entities that communicate with a specified networking protocol.
  • What is a quantum logic gate? - A quantum logic gate is a basic quantum device that operates on a small number of quantum bits or qubits.
  • What is a quantum processing unit (QPU)? - A quantum processing unit (QPU) is a hardware device that uses quantum mechanics -- such as superposition and entanglement-- to perform complex calculations on quantum information stored in quantum bits, or qubits.
  • What is a qubit (quantum bit)? - A qubit, short for quantum bit, is the basic unit of information in quantum computing and the counterpart to the bit, or binary digit, in classical computing.
  • What is a recommendation engine? - A recommendation engine is a system that gives customers recommendations based on their behavior patterns and similarities to people who might have shared preferences.
  • What is a remote desktop and how does it work? - A remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.
  • What is a Request for Comments (RFC)? - A Request for Comments (RFC) is a formal document created by the Internet Engineering Task Force (IETF) that outlines technical specifications, organizational notes and standards relevant to internet and networking technologies, including protocols such as routing, addressing and transport technologies.
  • What is a server? - A server is a computer program or device that provides a service to another computer program and its user, also known as the client.
  • What is a smart home? Everything you need to know - A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
  • What is a stablecoin? - A stablecoin is a type of cryptocurrency designed to maintain a stable market value by pegging its price to a reserve asset, such as a fiat currency, e.
  • What is a supercomputer? - A supercomputer is a highly advanced computer that performs at or near the highest operational rate for computers.
  • What is a SYN flood DoS attack? - A SYN flood attack is a type of denial-of-service (DoS) attack on a computer server.
  • What is a uniform resource identifier (URI)? - A uniform resource identifier (URI) is a character sequence that identifies a logical (abstract) or physical resource -- usually, but not always, connected to the internet.
  • What is a unique identifier (UID)? - A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
  • What is a URL (Uniform Resource Locator)? - A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet.
  • What is a UUID (Universally Unique Identifier)? - A UUID (Universal Unique Identifier) is a 128-bit value used to uniquely identify an object or entity on the internet.
  • What is a web server? - A web server is software and hardware that uses HTTP and other protocols to respond to client requests made over the World Wide Web.
  • What is an IoT gateway? - An IoT gateway is a physical device or software program that serves as the connection point between the cloud and internet of things devices, such as controllers, sensors and smart devices.
  • What is an IP address (Internet Protocol address)? - An Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet.
  • What is an operating system (OS)? - An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all the other application programs in a computer.
  • What is authentication, authorization and accounting (AAA)? - Authentication, authorization and accounting (AAA) is a security framework for controlling and tracking user access within a computer network.
  • What is Border Gateway Protocol (BGP)? - BGP (Border Gateway Protocol) is the protocol that enables the internet's global routing system.
  • What is brain hacking? - Brain hacking, or neurohacking, is the application of techniques or technologies to affect an individual's mental state, cognitive processes or level of function.
  • What is cloud computing? Types, examples and benefits - Cloud computing is a general term for the on-demand delivery of hosted computing and IT services over the internet with pay-as-you-go pricing.
  • What is computational linguistics? Definition and career info - Computational linguistics (CL) is the application of computer science to the analysis and comprehension of written and spoken language.
  • What is crowdsourcing? - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • What is customer self-service? - Customer self-service is digital support that lets end users access information and perform routine tasks without requiring the assistance of live agents or representatives.
  • What is DHCP (Dynamic Host Configuration Protocol)? - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an Internet Protocol (IP) address to any device on a network so it can communicate.
  • What is e-business? - E-business (electronic business) is the conduct of online business processes on the web, internet, extranet or a combination thereof.
  • What is Enterprise Service Bus (ESB)? - An enterprise service bus (ESB) is a software platform used to distribute work among connected components of an application.
  • What is Extensible Authentication Protocol (EAP)? - Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by Point-to-Point Protocol (PPP), a protocol often used when connecting a computer to the internet.
  • What is FileZilla? - FileZilla is a free, open source file transfer protocol (FTP) application that enables users to transfer files between local devices and remote servers.
  • What is FTP? - File Transfer Protocol (FTP) is a network protocol for transmitting files between computers over TCP/IP connections.
  • What is HTTP and how does it work? Hypertext Transfer Protocol - HTTP (Hypertext Transfer Protocol) is the set of rules for transferring files -- such as text, images, sound, video and other multimedia files -- over the web.
  • What is hybrid cloud? The ultimate guide - A hybrid cloud is a cloud computing environment that uses a mix of on-premises, private cloud and third-party public cloud services with orchestration among these platforms.
  • What is IDoc (intermediate document)? - IDoc (intermediate document) is a standard data structure used in SAP applications to transfer data to and from SAP system applications and external systems.
  • What is image metadata and how is it used? - Image metadata is text information pertaining to an image file that is embedded into the file or saved to a separate file that is associated with the image file.
  • What is interactive voice response (IVR)? - Interactive voice response (IVR) is an automated telephony system that interacts with callers, gathers information and routes calls to the appropriate recipients.
  • What is IoT (internet of things)? - The internet of things, or IoT, is a network of interrelated devices that connect and exchange data with other IoT devices and the cloud.
  • What is IoT integration? - IoT integration is the process of linking smart devices, applications, databases and systems to facilitate data exchange and enable automated workflows.
  • What is IPv6 (Internet Protocol version 6)? - Internet Protocol version 6 (IPv6) is a set of specifications from the Internet Engineering Task Force (IETF) that is responsible for identifying network devices and routing traffic across the internet.
  • What is LARP (live-action role-playing)? - LARP (live-action role-playing ), sometimes referred to as LARPing, is a form of gameplay where participants physically portray characters in a fictional setting.
  • What is LDAP (Lightweight Directory Access Protocol)? - LDAP (Lightweight Directory Access Protocol) is a software protocol used for locating data about organizations, individuals and other resources, such as files and devices, on public and corporate networks.
  • What is Microsoft? - Microsoft is the world's largest vendor of computer software and a leading provider of cloud computing services, video games, computer and gaming hardware, search and other online services.
  • What is mixed reality? - Mixed reality refers to advanced technology that combines both virtual reality (VR), a fully immersive computer-generated experience, and augmented reality (AR), which integrates digital elements into the physical world.
  • What is mobile computing? - Mobile computing refers to the set of IT technologies, products, services and operational strategies and procedures that enable end users to access computation, information and related resources and capabilities while mobile.
  • What is narrowband IoT (NB-IoT)? - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) standard that uses low-power wide area network (LPWAN) technology.
  • What is network-attached storage (NAS)? A complete guide - Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve data from centralized disk capacity.
  • What is NISQ computing? Pros and cons - Noisy intermediate-scale quantum (NISQ) computing defines the present stage of quantum computing, in which quantum devices have a moderate qubit count, ranging from 50 to 1,000.
  • What is pharming? - Pharming is a scamming practice in which malicious code is installed on a PC or server, misdirecting users to fraudulent websites without their knowledge or consent.
  • What is ping and how does it work? - Ping (Packet Internet Groper) is a basic internet program that enables a user to test and verify if a particular destination Internet Protocol (IP) address is reachable and can respond to network requests.
  • What is quantum computing? How it works and examples - Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
  • What is quantum machine learning? How it works - Quantum machine learning (QML), also called quantum-enhanced machine learning, blends the computing power of quantum systems with the increasing computing demands of evolving machine learning models.
  • What is quantum technology? Use cases and future implications - Quantum technology is a field of physics dedicated to developing new and innovative technologies based on the principles of quantum mechanics.
  • What is RCS messaging (RCS chat)? Explaining how to use it - RCS, or Rich Communication Services, is a messaging protocol used in mobile devices.
  • What is Reddit? How it works, history and pros and cons - Reddit is a social media platform and forum-style website where content is socially curated and promoted by site members through voting.
  • What is REpresentational State Transfer (REST) - REST (REpresentational State Transfer) is an architectural style for developing web services and systems that can easily communicate with each other.
  • What is Routing Information Protocol (RIP)? - Routing Information Protocol (RIP) is a distance vector protocol that uses hop count as its primary metric.
  • What is SAP NetWeaver? - SAP NetWeaver is an open application server platform that enables organizations to integrate many applications, standardize business processes and edit information as needed.
  • What is short message service center (SMSC)? - The short message service center (SMSC) is the portion of a mobile phone network that handles text message operations.
  • What is social media marketing (SMM)? - Social media marketing (SMM) is a form of internet marketing that uses social media apps as a marketing tool.
  • What is SSH (Secure Shell) and How Does It Work? - SSH (Secure Shell or Secure Socket Shell) is a network protocol that gives users -- particularly systems administrators -- a secure way to access a computer over an unsecured network.
  • What is TCP/IP? - TCP/IP stands for Transmission Control Protocol/Internet Protocol and is a suite of communication protocols used to interconnect network devices on the internet.
  • What is the artificial intelligence of things (AIoT)? - The artificial intelligence of things (AIoT) is the combination of AI technologies and the internet of things (IoT) infrastructure.
  • What is the blue screen of death (BSOD)? - The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).
  • What is the consumerization of IT (IT consumerization)? - The consumerization of IT refers to how software and hardware products designed for personal use have migrated into the enterprise and are used for work purposes.
  • What is the dark web (darknet)? - The dark web is an encrypted portion of the internet not visible to the general public via a traditional search engine such as Google.
  • What is the digital divide? - The digital divide is the gap between demographics and regions that have access to modern information and communications technology (ICT) and those with no or restricted access.
  • What is the domain name system (DNS)? - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • What is the principle of least privilege (POLP)? - The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what is strictly required to do their jobs.
  • What is the Semantic Web? Definition, history and timeline - The Semantic Web is a vision for linking data across webpages, applications and files.
  • What is the Unified Extensible Firmware Interface (UEFI)? - Unified Extensible Firmware Interface (UEFI) is a specification for a software program that connects a computer's firmware to its operating system (OS).
  • What is unified endpoint management (UEM)? A complete guide - Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console.
  • What is User Datagram Protocol (UDP)? - User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections between applications on the internet.
  • white hat link building - White hat link building is a search engine optimization (SEO) technique for increasing the number of high-quality backlinks to a webpage.
  • whitelist (allowlist) - A whitelist (allowlist) is a cybersecurity strategy that approves a list of email addresses, IP addresses, domain names or applications, while denying all others.
  • wiki - A wiki is a web-based collaborative platform that enables users to store, create and modify content in an organized manner.
  • Windows Imaging Format (WIM) - Windows Imaging Format (WIM) is used for the creation and distribution of disk image files.
  • Windows Management Instrumentation (WMI) - Windows Management Instrumentation (WMI) is a set of specifications from Microsoft for consolidating the management of devices and applications in a network from Windows computing systems.