Browse Definitions :

Internet technologies

This WhatIs.com glossary contains terms related to Internet technologies, including definitions about port numbers, standards and protocols and words and phrases about how the Internet works.

136 - DYN

  • 136 browser colors with names - Some Web page creators prefer to specify colors by name rather than by hexadecimal red-green-blue (RGB) intensity value.
  • 24x7 (24 hours a day, 7 days a week) - 24x7 means "24 hours a day, 7 days a week" and is used to describe a service, such as computer server monitoring, that is continuous, is always available (day or night), or involves products that can run constantly without disruption or downtime.
  • 3PL (third-party logistics) - A 3PL (third-party logistics) provider offers outsourced logistics services, which encompass anything that involves management of one or more facets of procurement and fulfillment activities.
  • 4 P's marketing mix - The marketing mix, also known as the four P's of marketing, refers to the four key elements of a marketing strategy: product, price, place and promotion.
  • AAA server (authentication, authorization and accounting) - An AAA server is a server program that handles user requests for access to computer resources and, for an enterprise, provides authentication, authorization and accounting (AAA) services.
  • access log - An access log is a list of all requests for individual files -- such as Hypertext Markup Language files, their embedded graphic images and other associated files that get transmitted -- that people or bots have made from a website.
  • address space - Address space is the amount of memory allocated for all possible addresses for a computational entity -- for example, a device, a file, a server or a networked computer.
  • Adobe Flash Player - Adobe Flash Player is software used to stream and view video, audio, multimedia and Rich Internet Applications on a computer or supported mobile device.
  • AJAX (Asynchronous JavaScript and XML) - AJAX (Asynchronous JavaScript and XML) is a technique aimed at creating better and faster interactive web apps by combining several programming tools including JavaScript, dynamic HTML (DHTML) and Extensible Markup Language (XML).
  • Amazon Prime - Amazon Prime is a subscription membership to Amazon that offers customers premium services for a yearly or monthly fee.
  • analog telephone adapter (ATA) - An analog telephone adapter (ATA) is a device used to connect an analog telephone, fax machine or similar equipment to a computer or network to enable communications over the internet.
  • anonymous FTP (File Transfer Protocol) - Anonymous File Transfer Protocol (FTP) is a method for allowing users to access public files from a remote server or archive site without requiring them to identify themselves to the server or site.
  • anti-replay protocol - The anti-replay protocol provides Internet Protocol (IP) packet-level security by making it impossible for a hacker to intercept message packets and insert changed packets into the data stream between a source computer and a destination computer.
  • API management - API management is the process by which an organization creates, oversees and controls application program interfaces (APIs) in a secure and scalable environment.
  • Apple TV (Apple TV 4) - Apple TV is a set-top box that allows end users to stream multimedia content from the Internet over a television.
  • artificial intelligence of things (AIoT) - Artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
  • authentication, authorization and accounting (AAA) - Authentication, authorization and accounting (AAA) is a security framework for controlling and tracking user access within a computer network.
  • autofill - Autofill, also called autocomplete, is a software feature that automatically inserts previously entered personal information into web form fields for the user's convenience.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based OSes -- included since Windows 98 and Windows ME -- that enables a Dynamic Host Configuration Protocol client to automatically assign an IP address to itself when there's no DHCP server available to perform that function.
  • autonomous system (AS) - An autonomous system (AS) in networking is a collection of one or more associated Internet Protocol (IP) prefixes with a clearly defined routing policy that governs how the AS exchanges routing information with other autonomous systems.
  • backward compatible (backward compatibility) - Backward compatible (also known as downward compatible or backward compatibility) refers to a hardware or software system that can successfully use interfaces and data from earlier versions of the system or with other systems.
  • behavioral targeting - Behavioral targeting is the presentation of content and marketing based on the previous choices of users across websites.
  • bell curve - A bell curve is a form of graph that is used to visualize the distribution of a set of chosen values across a specified group that tend to have a central, normal values, as peak with low and high extremes tapering off relatively symmetrically on either side.
  • Betteridge's law (of headlines) - Betteridge's law (of headlines) is an adage that states "Any headline that ends in a question mark can be answered by the word no.
  • BGP (Border Gateway Protocol) - BGP (Border Gateway Protocol) is the protocol that enables the global routing system of the internet.
  • Big Tech - Big Tech is a term that refers to the most dominant and largest technology companies in their respective sectors.
  • BIOS rootkit - A BIOS-level rootkit is programming that exists in a system's memory hardware to enable remote administration.
  • Bitcoin - Bitcoin is a digital currency -- also called cryptocurrency -- that can be traded for goods or services with vendors that accept Bitcoin as payment.
  • Bitcoin address - A Bitcoin address is a digital identifier that serves as a location where the cryptocurrency can be sent.
  • Bitly - Bitly is a URL shortener service that enables users to truncate webpage links.
  • blockchain decentralization - Decentralization is the distribution of functions, control and information instead of being centralized in a single entity.
  • blue screen of death (BSOD) - Officially called the stop screen, or stop error, the blue screen of death (BSOD) is a most unwanted error, second only to malware or ransomware in indicating that a user is in for a very bad day.
  • BPEL (Business Process Execution Language) - BPEL (Business Process Execution Language) is an XML-based language that allows web services, APIs and human processes in a service-oriented architecture (SOA) to interconnect and share data in a business workflow.
  • brain hacking - Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function.
  • browser - A browser is an application program that provides a way to look at and interact with all the information on the World Wide Web.
  • browser hijacker (browser hijacking) - A browser hijacker is a malware program that modifies web browser settings without the user's permission and redirects the user to websites the user had not intended to visit.
  • burn-in - Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems.
  • Burning Man - Burning Man is an annual week-long event focusing on self-expression and community that takes place in the Black Rock Desert in northern Nevada.
  • cache - A cache -- pronounced CASH -- is hardware or software that is used to store something, usually data, temporarily in a computing environment.
  • caching - Caching -- pronounced "cashing" -- is the process of storing data in a cache, which is a temporary storage area that facilitates faster access to data with the goal of improving application and system performance.
  • call control - Call control is a process that is used in telecommunications networks to monitor and maintain connections once they have been established.
  • call deflection - Call deflection is a feature of voice over IP (VoIP) that automatically redirects a call from the called endpoint to another endpoint (usually a voice mailbox) when the called endpoint is busy.
  • call detail record (CDR) - A call detail record (CDR) in voice over IP (VoIP) is a file containing information about recent system usage such as the identities of sources (points of origin), the identities of destinations (endpoints), the duration of each call, the amount billed for each call, the total usage time in the billing period, the total free time remaining in the billing period, and the running total charged during the billing period.
  • call signaling - Call signaling is a process that is used to set up a connection in a telephone network.
  • canonical name (CNAME) - A canonical name (CNAME) is a type of Domain Name System (DNS) database record that indicates that a domain name is the nickname or alias for another domain name.
  • central bank digital currency (CBDC) - A central bank digital currency (CBDC) is a digital version of a country's central bank money or fiat currency.
  • certificate authority (CA) - A certificate authority (CA) is a trusted entity that issues Secure Sockets Layer (SSL) certificates.
  • channel partner - A channel partner is a person or organization that provides services or sells products on behalf of a software, hardware, networking or cloud services vendor.
  • chatting - While the term chatting or chitchat refers in general to communication between two or more parties that can occur in person, in today's modern age, it can also occur over the internet via Short Message Service (SMS) text message and Multimedia Messaging Service (MMS) or, for example, through tools like Slack and Microsoft Teams and social media platforms like Facebook and Twitter.
  • chiplet - A chiplet is a sub processing unit, usually controlled by a I/O controller chip on the same package.
  • CIDR (Classless Inter-Domain Routing or supernetting) - CIDR (Classless Inter-Domain Routing or supernetting) is a method of assigning IP addresses that improves the efficiency of address distribution and replaces the previous system based on Class A, Class B and Class C networks.
  • CIFS (Common Internet File System) - CIFS (Common Internet File System) is a protocol that gained popularity around the year 2000, as vendors worked to establish an Internet Protocol-based file-sharing protocol.
  • clean install - A clean install is a software installation in which any previous version is eradicated.
  • clickstream data (clickstream analytics) - Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about which pages a website visitor visits -- and in what order.
  • clipboard - A clipboard is a temporary storage area for data that the user wants to copy from one place to another.
  • cloud access security broker (CASB) - A cloud access security broker (CASB) is a software tool or service that sits between an organization's on-premises infrastructure and a cloud provider's infrastructure.
  • cloud computing - Cloud computing is a general term for anything that involves delivering hosted services over the internet.
  • CNAME - A CNAME specifies an alias or nickname for a canonical name record in a domain name system (DNS) database.
  • colocation (colo) - A colocation facility, or colo, is a data center facility in which a business can rent space for servers and other computing hardware.
  • com - On the Internet, "com" is one of the top-level domain names that can be used when choosing a domain name.
  • commodity hardware - Commodity hardware in computing is computers or components that are readily available, inexpensive and easily interchangeable with other commodity hardware.
  • Common Language Runtime (CLR) - The Common Language Runtime (CLR) is programming that manages the execution of programs written in any of several supported languages, allowing them to share common object-oriented classes written in any of the languages.
  • Common Service Center (CSC) - Common Service Center (CSC) is an initiative by the government of India to establish locations with computers that are freely available for citizens to use.
  • computational linguistics (CL) - Computational linguistics (CL) is the application of computer science to the analysis and comprehension of written and spoken language.
  • connection - In telecommunication and computing in general, a connection is the successful completion of necessary arrangements so that two or more parties (for example, people or programs) can communicate at a long distance.
  • connectionless - In telecommunications, connectionless describes communication between two network endpoints in which a message can be sent from one endpoint to another without prior arrangement.
  • Consensus Algorithm - A consensus algorithm is a process in computer science used to achieve agreement on a single data value among distributed processes or systems.
  • consumerization of IT - The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes.
  • content filtering - Content filtering is a process involving the use of software or hardware to screen and/or restrict access to objectionable email, webpages, executables and other suspicious items.
  • content management system (CMS) - A content management system (CMS) is a software application or set of related programs that help create and manage digital content.
  • content personalization - Content personalization is a branding and marketing strategy in which webpages, email and other forms of content are tailored to match the characteristics, preferences or behaviors of individual users.
  • cookie - A cookie is information that a website puts on a user's computer.
  • corportal (corporate portal) - Corportals, short for corporate portals, are sometimes referred to as enterprise information portals and are used by corporations to build their internal web presence by leveraging a company's information resources.
  • crowdsourcing - Crowdsourcing is the practice of turning to a body of people to obtain needed knowledge, goods or services.
  • CSS (cascading style sheets) - This definition explains the meaning of cascading style sheets (CSS) and how using them with HTML pages is a user interface (UI) development best practice that complies with the separation of concerns design pattern.
  • Ctrl-Alt-Delete - On a personal computer with the Microsoft Windows operating system, Control+Alt+Delete is the combination of the Ctrl key, the Alt key, and Del key that a user can press at the same time to terminate an application task or to reboot the operating system.
  • customer self-service (CSS) - Customer self-service is a type of electronic support (e-support) that allows end users to access information and perform routine tasks without requiring the assistance of a human.
  • customer service and support - Customer service is the support that organizations offer to customers before and after purchasing a product or service.
  • cyberpsychology - Cyberpsychology is the field of study pertaining to the way people interact through computers or digital devices and the emotional effects that usage has on the brain.
  • dark web (darknet) - The dark web, also referred to as the darknet, is an encrypted portion of the internet that is not indexed by search engines and requires specific configuration or authorization to access.
  • data source name (DSN) - A data source name (DSN) is a data structure containing information about a specific database to which an Open Database Connectivity (ODBC) driver needs to connect.
  • death by PowerPoint - Death by PowerPoint is a phenomenon caused by the poor use of presentation software.
  • decentralized autonomous organization (DAO) - A decentralized autonomous organization (DAO) is a management structure that uses blockchain technology to automate some aspects of voting and transaction processing.
  • decentralized finance (DeFi) - Decentralized finance (DeFi) is an emerging model for organizing and enabling cryptocurrency-based transactions, exchanges and financial services.
  • deep tech - Deep technology, or deep tech, refers to advanced technologies based on some form of substantial scientific or engineering innovation.
  • deep web - The deep web is an umbrella term for parts of the internet not fully accessible through standard search engines like Google, Bing and Yahoo.
  • DHCP (Dynamic Host Configuration Protocol) - DHCP (Dynamic Host Configuration Protocol) is a network management protocol used to dynamically assign an IP address to any device, or node, on a network so it can communicate using IP.
  • digital divide - The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don't or have restricted access.
  • digital drugs - Digital drugs, more accurately called binaural beats, are sounds that are thought to be capable of changing brain wave patterns and inducing an altered state of consciousness similar to that effected by taking drugs or achieving a deep state of meditation.
  • digital tattoo - With more than one meaning, a digital tattoo is to a temporary tattoo that is outfitted with electronics, such as sensors or a near field communication (NFC) chip.
  • digitization - Digitization is the process of converting information into a digital format.
  • distributed learning - Distributed learning is a general term used to describe a multi-media method of instructional delivery that includes a mix of Web-based instruction, streaming video conferencing, face-to-face classroom time, distance learning through television or video, or other combinations of electronic and traditional educational models.
  • distributed ledger technology (DLT) - Distributed ledger technology (DLT) is a digital system for recording the transaction of assets in which the transactions and their details are recorded in multiple places at the same time.
  • DNS redirection - DNS redirection is the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected, such as an error page.
  • domain - Specific to the internet, the term domain can refer to how the internet is structured, and domain also refers to how an organization's network resources are organized.
  • domain name system (DNS) - The domain name system (DNS) is a naming database in which internet domain names are located and translated into Internet Protocol (IP) addresses.
  • dopamine-driven feedback loop - A dopamine-driven feedback loop is a self-perpetuating circuit fueled by the way the neurotransmitter works with the brain’s reward system.
  • downloading - Downloading is the transmission of a file or data from one computer to another over a network, usually from a larger server to a user device.
  • dynamic IP address - A dynamic IP address is a temporary address for devices connected to a network that will continually change over time.
  • dynamic port numbers - Dynamic port numbers, also known as private port numbers, are the port numbers that are available for use by any application to use in communicating with any other application, using the internet's Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
Networking
  • top-of-rack switching

    Top-of-rack switching is a data center architecture design in which computing equipment like servers, appliances and other ...

  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

Security
  • Zoombombing

    Zoombombing is a type of cyber-harassment in which an unwanted and uninvited user or group of such users interrupts online ...

  • CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

CIO
  • globalization

    Globalization is the process by which ideas, knowledge, information, goods and services spread around the world.

  • business process outsourcing (BPO)

    Business process outsourcing (BPO) is a business practice in which an organization contracts with an external service provider to...

  • localization

    Localization is the process of adapting and customizing a product to meet the needs of a specific market, as identified by its ...

HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close