List of Internet topics
Encyclopedia
This page provides an index of Internet-related topics.

A

Abilene Network
Abilene Network
Abilene Network was a high-performance backbone network created by the Internet2 community in the late 1990s. In 2007 the Abilene Network was retired and upgraded network was known as the "Internet2 Network".-History:...

 -
Ad hoc network -
Address resolution protocol
Address Resolution Protocol
Address Resolution Protocol is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37...

 -
ADSL
Asymmetric Digital Subscriber Line
Asymmetric digital subscriber line is a type of digital subscriber line technology, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. It does this by utilizing frequencies that are not used by a voice...

 -
AirPort
AirPort
AirPort and AirPort Extreme are local area wireless networking products from Apple Inc. based on the IEEE 802.11 standard ....

 -
All your base are belong to us
All your base are belong to us
"All your base are belong to us" is a broken English phrase that became an Internet phenomenon or meme in 2000–2002...

 -
AOL
AOL
AOL Inc. is an American global Internet services and media company. AOL is headquartered at 770 Broadway in New York. Founded in 1983 as Control Video Corporation, it has franchised its services to companies in several nations around the world or set up international versions of its services...

 -
APNIC -
AppleTalk
AppleTalk
AppleTalk is a proprietary suite of protocols developed by Apple Inc. for networking computers. It was included in the original Macintosh released in 1984, but is now unsupported as of the release of Mac OS X v10.6 in 2009 in favor of TCP/IP networking...

 -
Application Configuration Access Protocol
Application Configuration Access Protocol
The Application Configuration Access Protocol is a protocol for storing and synchronizing general configuration and preference data. It was originally developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in synch across all...

 -
Archimedes Plutonium -
Archie search engine
Archie search engine
Archie is a tool for indexing FTP archives, allowing people to find specific files. It is considered to be the first Internet search engine. The original implementation was written in 1990 by Alan Emtage, Bill Heelan, and J...

 -
ARIN
Arin
Arin may refer to:* American Registry for Internet Numbers* Arin, Armenia - A town in Armenia* Arin language - An extinct Yeniseic language* Arın Soğancıoğlu, Turkish basketball player...

 -
ASN.1 -
Asynchronous Transfer Mode
Asynchronous Transfer Mode
Asynchronous Transfer Mode is a standard switching technique designed to unify telecommunication and computer networks. It uses asynchronous time-division multiplexing, and it encodes data into small, fixed-sized cells. This differs from approaches such as the Internet Protocol or Ethernet that...

 -
Auction
Auction
An auction is a process of buying and selling goods or services by offering them up for bid, taking bids, and then selling the item to the highest bidder...

 -
Authentication
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 -
Automatic teller machine -
Autonomous system
Autonomous system (Internet)
Within the Internet, an Autonomous System is a collection of connected Internet Protocol routing prefixes under the control of one or more network operators that presents a common, clearly defined routing policy to the Internet....


B

Yahoo! Babel Fish -
Backbone cabal
Backbone cabal
The backbone cabal was an informal organization of large-site administrators of the worldwide distributed Internet discussion system Usenet. It existed from about 1983 at least into the 2000s....

 -
Base
Google Base
Google Base was an online database provided by Google into which any user can add almost any type of content, such as text, images, and structured information in formats such as XML, PDF, Excel, RTF, or WordPerfect. As of September 2010, the product has since been promoted to Google Merchant Center...

 -
Bet exchange
Bet exchange
A betting exchange is an entity which provides "trading" facilities for retail or bookmaker customers to buy and sell contracts. Contracts are structured as binary options. Some betting exchanges may also offer CFD products...

 -
Biefeld-Brown effect -
Blank media tax -
Bogon filtering
Bogon filtering
A bogon is a bogus IP address, and an informal name for an IP packet on the public Internet that claims to be from an area of the IP address space reserved, but not yet allocated or delegated by the Internet Assigned Numbers Authority or a delegated Regional Internet Registry...

 -
Bomb-making instructions on the internet
Bomb-making instructions on the internet
The availability of bomb-making instruction on the Internet has been a cause célèbre amongst lawmakers and politicians anxious to curb the Internet frontier by censoring certain types of information deemed "dangerous" which is available online...

 -
Book
Book
A book is a set or collection of written, printed, illustrated, or blank sheets, made of hot lava, paper, parchment, or other materials, usually fastened together to hinge at one side. A single sheet within a book is called a leaf or leaflet, and each side of a leaf is called a page...

 -
Bookmark -
Border gateway protocol
Border Gateway Protocol
The Border Gateway Protocol is the protocol backing the core routing decisions on the Internet. It maintains a table of IP networks or 'prefixes' which designate network reachability among autonomous systems . It is described as a path vector protocol...

 -
Broadband Integrated Services Digital Network
Broadband Integrated Services Digital Network
In the 1980s the telecommunications industry expected that digital services would follow much the same pattern as voice services did on the public switched telephone network, and conceived a grandiose end-to-end circuit switched services, known as Broadband Integrated Services Digital Network...

 -
Broadband Internet -
Bulletin board system
Bulletin board system
A Bulletin Board System, or BBS, is a computer system running software that allows users to connect and log in to the system using a terminal program. Once logged in, a user can perform functions such as uploading and downloading software and data, reading news and bulletins, and exchanging...


C

Cable modem
Cable modem
A cable modem is a type of network bridge and modem that provides bi-directional data communication via radio frequency channels on a HFC and RFoG infrastructure. Cable modems are primarily used to deliver broadband Internet access in the form of cable Internet, taking advantage of the high...

 -
CDDB
CDDB
CDDB, short for Compact Disc Database, is a database for software applications to look up audio CD information over the Internet. This is performed by a client which calculates a unique disc ID and then queries the database. As a result, the client is able to display the artist name, CD title,...

 -
Content-control software
Content-control software
Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web...

 -
Chain letter
Chain letter
A typical chain letter consists of a message that attempts to the recipient to make a number of copies of the letter and then pass them on to as many recipients as possible...

 -
Charles Stark Draper Prize
Charles Stark Draper Prize
The National Academy of Engineering annually awards the Charles Stark Draper Prize, which is given for the advancement of engineering and the education of the public about engineering. It is one of three prizes that constitute the "Nobel Prizes of Engineering" - the others being the Academy's Russ...

 -
Cisco Systems, Inc. -
Classless inter-domain routing
Classless Inter-Domain Routing
Classless Inter-Domain Routing is a method for allocating IP addresses and routing Internet Protocol packets. The Internet Engineering Task Force introduced CIDR in 1993 to replace the previous addressing architecture of classful network design in the Internet...

 -
Code Red worm -
Common Gateway Interface
Common Gateway Interface
The Common Gateway Interface is a standard method for web servers software to delegate the generation of web pages to executable files...

 -
Communications protocol
Communications protocol
A communications protocol is a system of digital message formats and rules for exchanging those messages in or between computing systems and in telecommunications...

 -
Component object model
Component Object Model
Component Object Model is a binary-interface standard for software componentry introduced by Microsoft in 1993. It is used to enable interprocess communication and dynamic object creation in a large range of programming languages...

 -
Computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

 -
Computer addiction
Computer addiction
Computer addiction is a loosely used term for the excessive use of computers to the extent that it interferes with daily life. Excessive use may explain problems in social interaction, mood, personality, work ethic, relationships, thought processes, or sleep deprivation.The Diagnostic and...

 -
Computer-assisted language learning
Computer-assisted language learning
Computer-assisted language learning is succinctly defined in a seminal work by Levy as "the search for and study of applications of the computer in language teaching and learning"...

 -
computer network
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

 -
Computer worm
Computer worm
A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach...

 -
Computing technology -
Concurrent Versions System
Concurrent Versions System
The Concurrent Versions System , also known as the Concurrent Versioning System, is a client-server free software revision control system in the field of software development. Version control system software keeps track of all work and all changes in a set of files, and allows several developers ...

 -
Consumer privacy
Consumer privacy
Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy measures...

 -
Content-control software
Content-control software
Content-control software, also known as censorware or web filtering software, is a term for software designed and optimized for controlling what content is permitted to a reader, especially when it is used to restrict material delivered over the Web...

 -
Content delivery
Content delivery
Content delivery describes the delivery of media content such as audio, video, computer software and video games over a delivery medium such as broadcasting or the Internet.Content delivery has two parts:...

 -
Coordinated Universal Time
Coordinated Universal Time
Coordinated Universal Time is the primary time standard by which the world regulates clocks and time. It is one of several closely related successors to Greenwich Mean Time. Computer servers, online services and other entities that rely on having a universally accepted time use UTC for that purpose...

 -
Customer privacy -
Cyber law -
Cyberpunk
Cyberpunk
Cyberpunk is a postmodern and science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983...

 -
Cybersex
Cybersex
Cybersex, also called computer sex, Internet sex, netsex, mudsex, TinySex and, colloquially, cybering, is a virtual sex encounter in which two or more persons connected remotely via computer network send each other sexually explicit messages describing a sexual experience...

 -
Cyberspace
Cyberspace
Cyberspace is the electronic medium of computer networks, in which online communication takes place.The term "cyberspace" was first used by the cyberpunk science fiction author William Gibson, though the concept was described somewhat earlier, for example in the Vernor Vinge short story "True...


D

Dark internet
Dark internet
A dark Internet or dark address refers to any or all unreachable network hosts on the Internet.The dark Internet should not be confused with either deep web or darknet...

 -
DDP
Datagram Delivery Protocol
Datagram Delivery Protocol is a member of the AppleTalk networking protocol suite. Its main responsibility is for socket-to-socket delivery of datagrams over an AppleTalk network....

 -
Defense Advanced Research Projects Agency
Defense Advanced Research Projects Agency
The Defense Advanced Research Projects Agency is an agency of the United States Department of Defense responsible for the development of new technology for use by the military...

 -
del.icio.us
Del.icio.us
Delicious is a social bookmarking web service for storing, sharing, and discovering web bookmarks. The site was founded by Joshua Schachter in 2003 and acquired by Yahoo! in 2005, and by the end of 2008, the service claimed more than 5.3 million users and 180 million unique bookmarked URLs...

 -
Delivermail
Delivermail
The ancestor of sendmail, delivermail is a mail transport agent that used the FTP protocol on the early ARPANET to transmit e-mail to the recipient....

 -
Demilitarized zone (computing)
Demilitarized zone (computing)
In computer security, a DMZ is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet...

 -
Denial of service -
DHCP
Dynamic Host Configuration Protocol
The Dynamic Host Configuration Protocol is a network configuration protocol for hosts on Internet Protocol networks. Computers that are connected to IP networks must be configured before they can communicate with other hosts. The most essential information needed is an IP address, and a default...

 -
Dial-up -
Dial-up access
Dial-up access
Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network to establish a dialled connection to an Internet service provider via telephone lines...

 -
DiffServ -
Digital divide
Digital divide
The Digital Divide refers to inequalities between individuals, households, business, and geographic areas at different socioeconomic levels in access to information and communication technologies and Internet connectivity and in the knowledge and skills needed to effectively use the information...

 -
Digital Equipment Corporation
Digital Equipment Corporation
Digital Equipment Corporation was a major American company in the computer industry and a leading vendor of computer systems, software and peripherals from the 1960s to the 1990s...

 -
Digital subscriber line
Digital Subscriber Line
Digital subscriber line is a family of technologies that provides digital data transmission over the wires of a local telephone network. DSL originally stood for digital subscriber loop. In telecommunications marketing, the term DSL is widely understood to mean Asymmetric Digital Subscriber Line ,...

 -
DirecTV
DirecTV
DirecTV is an American direct broadcast satellite service provider and broadcaster based in El Segundo, California. Its satellite service, launched on June 17, 1994, transmits digital satellite television and audio to households in the United States, Latin America, and the Anglophone Caribbean. ...

 -
DISH Network
Dish Network
Dish Network Corporation is the second largest pay TV provider in the United States, providing direct broadcast satellite service—including satellite television, audio programming, and interactive television services—to 14.337 million commercial and residential customers in the United States. Dish...

 -
Disk image
Disk image
A disk image is a single file or storage device containing the complete contents and structure representing a data storage medium or device, such as a hard drive, tape drive, floppy disk, CD/DVD/BD, or USB flash drive, although an image of an optical disc may be referred to as an optical disc image...

 -
Distance-vector routing protocol
Distance-vector routing protocol
In computer communication theory relating to packet-switched networks, a distance-vector routing protocol is one of the two major classes of routing protocols, the other major class being the link-state protocol...

 -
DNS
Domain name system
The Domain Name System is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities...

 -
Domain forwarding -
Domain name registry
Domain name registry
A domain name registry is a database of all domain names registered in a top-level domain. A registry operator, also called a network information center , is the part of the Domain Name System of the Internet that keeps the database of domain names, and generates the zone files which convert...

 -
DVB -
Dynamic DNS
Dynamic DNS
Dynamic DNS or DDNS is a term used for the updating in real time of Internet Domain Name System name servers to keep up to date the active DNS configuration of their configured hostnames, addresses and other information....


E

E-card
E-card
An e-card is similar to a postcard or greeting card, with the primary difference being that it is created using digital media instead of paper or other traditional materials. E-cards are made available by publishers usually on various Internet sites, where they can be sent to a recipient, usually...

 -
E-democracy
E-democracy
E-democracy refers to the use of information technologies and communication technologies and strategies in political and governance processes...

 -
E-mail
E-mail
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

 -
E-Services
E-Services
The concept of E-service , represents one prominent application of utilizing the use of Information and communication technologies in different areas. However, providing an exact definition of e-service is hard to come by as researchers have been using different definitions to describe e-service...

 -
EBay
EBay
eBay Inc. is an American internet consumer-to-consumer corporation that manages eBay.com, an online auction and shopping website in which people and businesses buy and sell a broad variety of goods and services worldwide...

 -
Eldred v. Ashcroft
Eldred v. Ashcroft
Eldred v. Ashcroft, was a court case in the United States challenging the constitutionality of the 1998 Sonny Bono Copyright Term Extension Act...

 -
Electronic mailing list
Electronic mailing list
An electronic mailing list is a special usage of email that allows for widespread distribution of information to many Internet users. It is similar to a traditional mailing list — a list of names and addresses — as might be kept by an organization for sending publications to...

 -
Electronic money
Electronic money
Electronic money is money or scrip that is only exchanged electronically. Typically, this involves the use of computer networks, the internet and digital stored value systems...

 -
Embrace, extend and extinguish
Embrace, extend and extinguish
"Embrace, extend and extinguish," also known as "Embrace, extend and exterminate," is a phrase that the U.S. Department of Justice found was used internally by Microsoft to describe its strategy for entering product categories involving widely used standards, extending those standards with...

 -
End-to-end connectivity -
Enterprise content management
Enterprise content management
Enterprise Content Management is a formalized means of organizing and storing an organization's documents, and other content, that relate to the organization's processes...

 -
Entropy
Entropy (computing)
In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data...

 -
Epoch -
Ethernet
Ethernet
Ethernet is a family of computer networking technologies for local area networks commercially introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired LAN technologies....

 -
European Installation Bus -
EverQuest
EverQuest
EverQuest, often shortened to EQ, is a 3D fantasy-themed massively multiplayer online role-playing game that was released on the 16th of March, 1999. The original design is credited to Brad McQuaid, Steve Clover, and Bill Trost...

 -
Everything2
Everything2
Everything2, Everything2, or E2 for short is a collaborative Web-based community consisting of a database of interlinked user-submitted written material. E2 is moderated for quality, but has no formal policy on subject matter...

 -
Extended ASCII
Extended ASCII
The term extended ASCII describes eight-bit or larger character encodings that include the standard seven-bit ASCII characters as well as others...

 -
Extranet
Extranet
An extranet is a computer network that allows controlled access from the outside, for specific business or educational purposes. An extranet can be viewed as an extension of a company's intranet that is extended to users outside the company, usually partners, vendors, and suppliers...

 -

F

Famous non-quotation -
Fan fiction
Fan fiction
Fan fiction is a broadly-defined term for fan labor regarding stories about characters or settings written by fans of the original work, rather than by the original creator...

 -
FAQ
FAQ
Frequently asked questions are listed questions and answers, all supposed to be commonly asked in some context, and pertaining to a particular topic. "FAQ" is usually pronounced as an initialism rather than an acronym, but an acronym form does exist. Since the acronym FAQ originated in textual...

 -
Federal Standard 1037C
Federal Standard 1037C
Federal Standard 1037C, titled Telecommunications: Glossary of Telecommunication Terms is a United States Federal Standard, issued by the General Services Administration pursuant to the Federal Property and Administrative Services Act of 1949, as amended....

 -
Fiber optic -
Fidonet
FidoNet
FidoNet is a worldwide computer network that is used for communication between bulletin board systems. It was most popular in the early to mid 1990s, prior to the introduction of easy and affordable access to the Internet...

 -
File sharing
File sharing
File sharing is the practice of distributing or providing access to digitally stored information, such as computer programs, multimedia , documents, or electronic books. It may be implemented through a variety of ways...

 -
File transfer protocol
File Transfer Protocol
File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server...

 -
Finger protocol
Finger protocol
In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.-Name/Finger protocol:...

 -
Firefox
Mozilla Firefox
Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation. , Firefox is the second most widely used browser, with approximately 25% of worldwide usage share of web browsers...

 -
Firewall -
Flaming -
Floppy disk
Floppy disk
A floppy disk is a disk storage medium composed of a disk of thin and flexible magnetic storage medium, sealed in a rectangular plastic carrier lined with fabric that removes dust particles...

 -
Focus group
Focus group
A focus group is a form of qualitative research in which a group of people are asked about their perceptions, opinions, beliefs and attitudes towards a product, service, concept, advertisement, idea, or packaging...

 -
Form
Form (document)
A form is a document with spaces in which to write or select, for a series of documents with similar contents. The documents usually have the printed parts in common, possibly except for a serial number...

 -
FORscene
FORscene
FORscene is an integrated internet video platform, video editing software, covering non linear editing and publishing for broadcast, web and mobile....

 -
Frame relay
Frame relay
Frame Relay is a standardized wide area network technology that specifies the physical and logical link layers of digital telecommunications channels using a packet switching methodology...

 -
FTP
File Transfer Protocol
File Transfer Protocol is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server...


G

Gecko
Gecko (layout engine)
Gecko is a free and open source layout engine used in many applications developed by Mozilla Foundation and the Mozilla Corporation , as well as in many other open source software projects....

 -
Geocaching
Geocaching
Geocaching is an outdoor sporting activity in which the participants use a Global Positioning System receiver or mobile device and other navigational techniques to hide and seek containers, called "geocaches" or "caches", anywhere in the world....

 -
G.hn
G.hn
G.hn is the common name for a home network technology family of standards developed under the International Telecommunication Union's Standardization arm and promoted by the HomeGrid Forum...

 -
GIMPS -
Glossary of Internet-related terminology -
GNU
GNU
GNU is a Unix-like computer operating system developed by the GNU project, ultimately aiming to be a "complete Unix-compatible software system"...

 -
Gnutella
Gnutella
Gnutella is a large peer-to-peer network which, at the time of its creation, was the first decentralized peer-to-peer network of its kind, leading to other, later networks adopting the model...

 -
Google
Google
Google Inc. is an American multinational public corporation invested in Internet search, cloud computing, and advertising technologies. Google hosts and develops a number of Internet-based services and products, and generates profit primarily from advertising through its AdWords program...

 -
Gopher protocol

H

Hacker ethic
Hacker ethic
Hacker ethic is the generic phrase which describes the moral values and philosophy that are standard in the hacker community. The early hacker culture and resulting philosophy originated at the Massachusetts Institute of Technology in the 1950s and 1960s...

 -
Hate sites -
HDLC -
Head end
Cable television headend
A cable television headend is a master facility for receiving television signals for processing and distribution over a cable television system. The headend facility is normally unstaffed and surrounded by some type of security fencing and is typically a building or large shed housing electronic...

 -
Hierarchical routing
Hierarchical routing
Hierarchical routing is method of routing in networks that is based on hierarchical addressing.-Background:Most Transmission Control Protocol/Internet Protocol routing is based on a two-level hierarchical routing in which an IP address is divided into a network portion and a host portion...

 -
High speed internet -
Hilary Rosen
Hilary Rosen
Hilary Beth Rosen is a partner in the political communications firm, SKDKnickerbocker with offices in DC and New York. Prior to joining SKDK, she was the managing partner of the DC office of the Brunswick Group, a London based PR and communications strategy firm. She joined Brunswick in...

 -
History of radio
History of radio
The early history of radio is the history of technology that produced radio instruments that use radio waves. Within the timeline of radio, many people contributed theory and inventions in what became radio. Radio development began as "wireless telegraphy"...

 -
History of the Internet
History of the Internet
The history of the Internet starts in the 1950s and 1960s with the development of computers. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching...

 -
Homepage
Homepage
A home page or homepage has various related meanings to do with web sites:* It most often refers to the initial or main web page of a web site, sometimes called the front page ....

 -
HomePNA
HomePNA
The HomePNA Alliance is an incorporated non-profit industry association of companies that develops and standardizes technology for home networking over the existing coaxial cables and telephone wiring within homes.-Overview:HomePNA does not manufacture products, although its members do...

 -
Hop (telecommunications)
Hop (telecommunications)
In telecommunication, the term hop has the following meanings:#The excursion of a radio wave from the Earth to the ionosphere and back to the Earth...

 -
HTML
HTML
HyperText Markup Language is the predominant markup language for web pages. HTML elements are the basic building-blocks of webpages....

 -
HTTP -
HTTPS
Https
Hypertext Transfer Protocol Secure is a combination of the Hypertext Transfer Protocol with SSL/TLS protocol to provide encrypted communication and secure identification of a network web server...

 -
Human-computer interaction

I

ICANN
ICANN
The Internet Corporation for Assigned Names and Numbers is a non-profit corporation headquartered in Marina del Rey, California, United States, that was created on September 18, 1998, and incorporated on September 30, 1998 to oversee a number of Internet-related tasks previously performed directly...

 -
ICQ
ICQ
ICQ is an instant messaging computer program, which was first developed and popularized by the Israeli company Mirabilis, then bought by America Online, and since April 2010 owned by Mail.ru Group. The name ICQ is a homophone for the phrase "I seek you"...

 -
Identity theft
Identity theft
Identity theft is a form of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name...

 -
IEEE 802.11
IEEE 802.11
IEEE 802.11 is a set of standards for implementing wireless local area network computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee . The base version of the standard IEEE 802.11-2007 has had subsequent...

 -
IIRC -
IMAP
Internet Message Access Protocol
Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol...

 -
IMAPS -
Indigenous Dialogues
Indigenous Dialogues
The Indigenous Dialogues Foundation was an international project which sought to empower organisations of indigenous peoples worldwide to communicate directly, freely, and affordably, allowing them to more effectively work together for their common interests.ID provided internet connectivity and...

 -
Infocom
Infocom
Infocom was a software company, based in Cambridge, Massachusetts, that produced numerous works of interactive fiction. They also produced one notable business application, a relational database called Cornerstone....

 -
Information Age
Information Age
The Information Age, also commonly known as the Computer Age or Digital Age, is an idea that the current age will be characterized by the ability of individuals to transfer information freely, and to have instant access to knowledge that would have been difficult or impossible to find previously...

 -
Information Awareness Office
Information Awareness Office
The Information Awareness Office was established by the Defense Advanced Research Projects Agency in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to national security,...

 -
Instant messaging
Instant messaging
Instant Messaging is a form of real-time direct text-based chatting communication in push mode between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet...

 -
Integrated Services Digital Network
Integrated Services Digital Network
Integrated Services Digital Network is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network...

 -
Internet
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...

 -
Internet access in the United States -
Internet Archive
Internet Archive
The Internet Archive is a non-profit digital library with the stated mission of "universal access to all knowledge". It offers permanent storage and access to collections of digitized materials, including websites, music, moving images, and nearly 3 million public domain books. The Internet Archive...

 -
Internet as a source of prior art
Internet as a source of prior art
In the context of patent law, using the Internet as a source of prior art when assessing whether an invention is novel and inventive, is problematic since it is often difficult to ascertain precisely when information on websites became available to the public...

 -
Internet backbone
Internet backbone
The Internet backbone refers to the principal data routes between large, strategically interconnected networks and core routers in the Internet...

 -
Internet Capitalization Conventions
Internet capitalization conventions
Internet capitalization conventions are the practices of various publishers regarding the capitalization of "Internet" or "internet", when referring to the Internet/internet, as distinct from generic internets ....

 -
Internet censorship
Internet censorship
Internet censorship is the control or suppression of the publishing of, or access to information on the Internet. It may be carried out by governments or by private organizations either at the behest of government or on their own initiative...

 -
Internet censorship circumvention
Internet censorship circumvention
Internet censorship circumvention is the process used by technologically savvy Internet users to bypass the technical aspects of Internet filtering and gain access to otherwise censored material....

 -
Internet Chess Club
Internet Chess Club
The Internet Chess Club is a commercial Internet chess server devoted to the play and discussion of chess and chess variants. ICC currently has over 30,000 subscribing members...

 -
Internet child pornography -
Internet control message protocol
Internet Control Message Protocol
The Internet Control Message Protocol is one of the core protocols of the Internet Protocol Suite. It is chiefly used by the operating systems of networked computers to send error messages indicating, for example, that a requested service is not available or that a host or router could not be...

 -
Internet democracy
E-democracy
E-democracy refers to the use of information technologies and communication technologies and strategies in political and governance processes...

 -
Internet Engineering Task Force
Internet Engineering Task Force
The Internet Engineering Task Force develops and promotes Internet standards, cooperating closely with the W3C and ISO/IEC standards bodies and dealing in particular with standards of the TCP/IP and Internet protocol suite...

 -
Internet friendship
Internet friendship
Internet relationships are interpersonal relationships, including intimate relationships, between people who have met online, and in many cases know each other only via the Internet. Online relationships are similar in many ways to pen pal relationships....

 -
Internet group management protocol
Internet Group Management Protocol
The Internet Group Management Protocol is a communications protocol used by hosts and adjacent routers on IP networks to establish multicast group memberships....

 -
Internet organizations
Internet organizations
This is a list of Internet organizations, or organizations that play or played a key role in the evolution of the Internet by developing recommendations, standards, and technology; deploying infrastructure and services; and addressing other major issues....

 -
Internet phone -
Internet pornography
Internet pornography
Internet pornography is pornography that is distributed by means of various sectors of the Internet, primarily via websites, peer-to-peer file sharing, or Usenet newsgroups...

 -
Internet Protocol
Internet Protocol
The Internet Protocol is the principal communications protocol used for relaying datagrams across an internetwork using the Internet Protocol Suite...

 -
Internet protocol suite
Internet protocol suite
The Internet protocol suite is the set of communications protocols used for the Internet and other similar networks. It is commonly known as TCP/IP from its most important protocols: Transmission Control Protocol and Internet Protocol , which were the first networking protocols defined in this...

 -
Internet radio
Internet radio
Internet radio is an audio service transmitted via the Internet...

 -
Internet-related terminology -
Internet Relay Chat
Internet Relay Chat
Internet Relay Chat is a protocol for real-time Internet text messaging or synchronous conferencing. It is mainly designed for group communication in discussion forums, called channels, but also allows one-to-one communication via private message as well as chat and data transfer, including file...

 -
Internet romance -
Internet service provider
Internet service provider
An Internet service provider is a company that provides access to the Internet. Access ISPs directly connect customers to the Internet using copper wires, wireless or fiber-optic connections. Hosting ISPs lease server space for smaller businesses and host other people servers...

 -
Internet slang
Internet slang
Internet slang is a type of slang that Internet users have popularized, and in many cases, have coined. Such terms often originate with the purpose of saving keystrokes. Many people use the same abbreviations in texting and instant messaging, and social networking websites...

 -
Internet Society
Internet Society
The Internet Society or ISOC is an international, nonprofit organization founded during 1992 to provide direction in Internet related standards, education, and policy...

 -
Internet standard
Internet standard
In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet. Internet Standards are created and published by the Internet Engineering Task Force .-Overview:...

 -
Internet Storm Center
Internet Storm Center
The Internet Storm Center is a program of the SANS Technology Institute, a branch of the SANS Institute which monitors the level of malicious activity on the Internet, particularly with regards to large-scale infrastructure events....

 -
Internet Strategy Forum
Internet Strategy Forum
The Internet Strategy Forum is a nonprofit professional association in the United States. ISF members have primary responsibility for driving Internet strategy and implementation for medium to large organizations....

 -
Internet time
Internet time
Internet time was a common catchphrase that originated during the late-1990s Internet boom. In this period, people who worked with the Internet had come to believe that "everything moved faster on the 'net", because the Internet made the dissemination of information far easier and cheaper...

 -
Internet troll -
Internet2
Internet2
Internet2 is an advanced not-for-profit US networking consortium led by members from the research and education communities, industry, and government....

 -
Internetworking
Internetworking
Internetworking is the practice of connecting a computer network with other networks through the use of gateways that provide a common method of routing information packets between the networks...

 -
InterNIC
InterNIC
The Internet Network Information Center, known as InterNIC, was the Internet governing body primarily responsible for domain name and IP address allocations from 1972 until September 18, 1998 when this role was assumed by the Internet Corporation for Assigned Names and Numbers...

 -
Interpedia
Interpedia
Interpedia was the name given to the first proposals for an Internet encyclopedia which would allow anyone to contribute by writing articles and submitting them to the central catalog of all Interpedia pages....

 -
Interplanetary Internet
Interplanetary Internet
The Interplanetary Internet is a conceived computer network in space, consisting of a set of network nodes which can communicate with each other. Communication would be greatly delayed by the great interplanetary distances, so the IPN needs a new set of protocols and technology that are tolerant...

 -
InterWiki
InterWiki
Interwiki linking is a facility for creating links to the many wikis on the World Wide Web. Users avoid pasting in entire URLs and instead use a shorthand similar to links within the same wiki ....

 -
Intranet
Intranet
An intranet is a computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. The term is used in contrast to internet, a network between organizations, and instead refers to a network...

 -
iOS
Cisco IOS
Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches...

 -
IP address
IP address
An Internet Protocol address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing...

 -
IP protocol -
IPv4
IPv4
Internet Protocol version 4 is the fourth revision in the development of the Internet Protocol and the first version of the protocol to be widely deployed. Together with IPv6, it is at the core of standards-based internetworking methods of the Internet...

 -
IPv6
IPv6
Internet Protocol version 6 is a version of the Internet Protocol . It is designed to succeed the Internet Protocol version 4...

 -
IPX
IPX
Internetwork Packet Exchange is the OSI-model Network layer protocol in the IPX/SPX protocol stack.The IPX/SPXM protocol stack is supported by Novell's NetWare network operating system. Because of Netware's popularity through the late 1980s into the mid 1990s, IPX became a popular internetworking...

 -
IRC -
ISCSI
ISCSI
In computing, iSCSI , is an abbreviation of Internet Small Computer System Interface, an Internet Protocol -based storage networking standard for linking data storage facilities. By carrying SCSI commands over IP networks, iSCSI is used to facilitate data transfers over intranets and to manage...

 -
ISDN
Integrated Services Digital Network
Integrated Services Digital Network is a set of communications standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network...

 -
ISO 8601
ISO 8601
ISO 8601 Data elements and interchange formats – Information interchange – Representation of dates and times is an international standard covering the exchange of date and time-related data. It was issued by the International Organization for Standardization and was first published in 1988...

 -
ISO 8859-1

J

JAIN -
James H. Clark
James H. Clark
James H. Clark is an American entrepreneur and computer scientist. He founded several notable Silicon Valley technology companies, including Silicon Graphics, Inc., Netscape Communications Corporation, myCFO and Healtheon...

 -
Java applet
Java applet
A Java applet is an applet delivered to users in the form of Java bytecode. Java applets can run in a Web browser using a Java Virtual Machine , or in Sun's AppletViewer, a stand-alone tool for testing applets...

 -
Java platform -
JavaScript
JavaScript
JavaScript is a prototype-based scripting language that is dynamic, weakly typed and has first-class functions. It is a multi-paradigm language, supporting object-oriented, imperative, and functional programming styles....

 -
Jon Postel
Jon Postel
Jonathan Bruce Postel was an American computer scientist who made many significant contributions to the development of the Internet, particularly with respect to standards...

 -
JPEG
JPEG
In computing, JPEG . The degree of compression can be adjusted, allowing a selectable tradeoff between storage size and image quality. JPEG typically achieves 10:1 compression with little perceptible loss in image quality....

 -
JSTOR
JSTOR
JSTOR is an online system for archiving academic journals, founded in 1995. It provides its member institutions full-text searches of digitized back issues of several hundred well-known journals, dating back to 1665 in the case of the Philosophical Transactions of the Royal Society...


K

KA9Q
KA9Q
KA9Q, also called KA9Q NOS or simply NOS, was a popular early implementation of TCP/IP and associated protocols for amateur packet radio systems and smaller personal computers connected via serial lines. It was named after the amateur radio callsign of Phil Karn, who first wrote the software for a...

 -
Knowledge Aided Retrieval in Activity Context -
Ken McVay
Ken McVay
Kenneth "Ken" McVay, OBC , a Canadian-American dual citizen, is an Internet activist against Holocaust denial. He is the founder of the Nizkor Project, one of the first websites against Holocaust denial....

 -
Kendra initiative
Kendra initiative
The Kendra Initiative founded by Daniel Harris in late 1999 is an open source initiative to create ways of using the Internet to discover, use, share and pay for digital media such as music, web content, books and films. Kendra seeks to foster an open distributed marketplace for digital media....

 -
Kerberos -
KNX
KNX (standard)
KNX is a standardized , OSI-based network communications protocol for intelligent buildings. KNX is the successor to, and convergence of, three previous standards: the European Home Systems Protocol , BatiBUS, and the European Installation Bus...


L

LACNIC -
Large Technical System
Large Technical System
a large technical system is a system or network of enormous proportions or complexity. The study of LTSs is a subdiscipline of history of science and technology....

 -
Larry Page -
Legal aspects of computing
Legal aspects of computing
Legal aspects of computing are related to the over-lapping areas of law and computing.The first one, historically, was Information Technology Law...

 -
Lightweight Directory Access Protocol
Lightweight Directory Access Protocol
The Lightweight Directory Access Protocol is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol network...

 -
Link-state routing protocol
Link-state routing protocol
A link-state routing protocol is one of the two main classes of routing protocols used in packet switching networks for computer communications . Examples of link-state routing protocols include OSPF and IS-IS....

 -
Linux Network Administrators' Guide
Linux Network Administrators' Guide
The Linux Network Administrator's Guide is a book on setting up and running Unix networks. The first and second editions are freely available in electronic form under the GFDL. It was originally produced by Olaf Kirch and others as part of the Linux Documentation Project with help from O'Reilly....

 -
LiveJournal
LiveJournal
LiveJournal is a virtual community where Internet users can keep a blog, journal or diary. LiveJournal is also the name of the free and open source server software that was designed to run the LiveJournal virtual community....

 -
Load balancing
Load balancing (computing)
Load balancing is a computer networking methodology to distribute workload across multiple computers or a computer cluster, network links, central processing units, disk drives, or other resources, to achieve optimal resource utilization, maximize throughput, minimize response time, and avoid...

 -
Local area network
Local area network
A local area network is a computer network that interconnects computers in a limited area such as a home, school, computer laboratory, or office building...

 -
Loopback
Loopback
Loopback describes ways of routing electronic signals, digital data streams, or flows of items from their originating facility back to the source without intentional processing or modification...

 -
Lycos
Lycos
Lycos, Inc. is a search engine and web portal established in 1994. Lycos also encompasses a network of email, webhosting, social networking, and entertainment websites.-Corporate history:...


M

Mailbomb
E-mail bomb
In Internet usage, an email bomb is a form of net abuse consisting of sending huge volumes of email to an address in an attempt to overflow the mailbox or overwhelm the server where the email address is hosted in a denial-of-service attack....

 -
Make money fast
Make Money Fast
"MAKE.MONEY.FAST" is a title of an electronically forwarded chain letter which became so infamous that the term is now used to describe all sorts of chain letters forwarded over the Internet, by e-mail spam or Usenet newsgroups...

 -
Matt Drudge
Matt Drudge
Matthew Nathan Drudge is the American creator and editor of the Drudge Report, a news aggregation website. Drudge is self-described as being conservative and populist. Drudge has also authored a book and hosted a radio show and a television show.-Early years:Matthew Drudge was raised in Takoma...

 -
Media player (application software) -
Medium
Mass media
Mass media refers collectively to all media technologies which are intended to reach a large audience via mass communication. Broadcast media transmit their information electronically and comprise of television, film and radio, movies, CDs, DVDs and some other gadgets like cameras or video consoles...

 -
Melissa worm -
MenuetOS
MenuetOS
MenuetOS is an operating system with a monolithic preemptive, real-time kernel, including video drivers, all written in FASM assembly language, for 64-bit and 32-bit x86 architecture computers, by Ville M. Turjanmaa...

 -
Metcalfe's law
Metcalfe's law
Metcalfe's law states that the value of a telecommunications network is proportional to the square of the number of connected usersof the system...

 -
Metropolitan area network
Metropolitan area network
A metropolitan area network is a computer network that usually spans a city or a large campus. A MAN usually interconnects a number of local area networks using a high-capacity backbone technology, such as fiber-optical links, and provides up-link services to wide area networks and the...

 -
Microsoft .NET -
Microsoft SQL Server
Microsoft SQL Server
Microsoft SQL Server is a relational database server, developed by Microsoft: It is a software product whose primary function is to store and retrieve data as requested by other software applications, be it those on the same computer or those running on another computer across a network...

 -
Mikrotik
Mikrotik
Mikrotīkls Ltd., known internationally as MikroTik, is a Latvian manufacturer of computer networking equipment. It sells wireless products and routers. The company was founded in 1995, with the intent to sell in the emerging wireless technology market. As of 2007, the company had more than 70...

 -
Miller test
Miller test
The Miller test , is the United States Supreme Court's test for determining whether speech or expression can be labeled obscene, in which case it is not protected by the First Amendment to the United States Constitution and can be prohibited.-History and details:The Miller test was developed in the...

 -
Mirror
Mirror (computing)
In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site.Mirror sites are most commonly used to provide multiple sources of the same information, and are of particular value as a way of providing reliable access to large downloads...

 -
Modem
Modem
A modem is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data...

 -
Modulation
Modulation
In electronics and telecommunications, modulation is the process of varying one or more properties of a high-frequency periodic waveform, called the carrier signal, with a modulating signal which typically contains information to be transmitted...

 -
Morris worm -
Mozilla Firefox
Mozilla Firefox
Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation. , Firefox is the second most widely used browser, with approximately 25% of worldwide usage share of web browsers...

 -
Mozilla Thunderbird
Mozilla Thunderbird
Mozilla Thunderbird is a free, open source, cross-platform e-mail and news client developed by the Mozilla Foundation. The project strategy is modeled after Mozilla Firefox, a project aimed at creating a web browser...

 -
MPEG-1 Audio Layer II
MPEG-1 Audio Layer II
MPEG-1 Audio Layer II or MPEG-2 Audio Layer II is a lossy audio compression format defined by ISO/IEC 11172-3 alongside MPEG-1 Audio Layer I and MPEG-1 Audio Layer III...

 -
Multicast
Multicast
In computer networking, multicast is the delivery of a message or information to a group of destination computers simultaneously in a single transmission from the source creating copies automatically in other network elements, such as routers, only when the topology of the network requires...

 -
MUMPS
MUMPS
MUMPS , or alternatively M, is a programming language created in the late 1960s, originally for use in the healthcare industry. It was designed for the production of multi-user database-driven applications...


MYSPACE
MySpace
Myspace is a social networking service owned by Specific Media LLC and pop star Justin Timberlake. Myspace launched in August 2003 and is headquartered in Beverly Hills, California. In August 2011, Myspace had 33.1 million unique U.S. visitors....

 -

N

Napster
Napster
Napster is an online music store and a Best Buy company. It was originally founded as a pioneering peer-to-peer file sharing Internet service that emphasized sharing audio files that were typically digitally encoded music as MP3 format files...

 -
NetBIOS
NetBIOS
NetBIOS is an acronym for Network Basic Input/Output System. It provides services related to the session layer of the OSI model allowing applications on separate computers to communicate over a local area network. As strictly an API, NetBIOS is not a networking protocol...

 -
Netiquette
Netiquette
Netiquette is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums. These rules were described in IETF RFC 1855. However, like many Internet phenomena, the concept and its application remain in a state of flux, and vary...

 -
Netscape Communicator
Netscape Communicator
Netscape Communicator was an Internet suite produced by Netscape Communications Corporation. Initially released in June 1997, Netscape Communicator 4.0 was the successor to Netscape Navigator 3.x and included more groupware features intended to appeal to enterprises.- Editions :Netscape...

 -
Netwar
Netwar
Netwar is a term developed by RAND researchers John Arquilla and David Ronfeldt to describe an emergent form of low intensity conflict, crime, and activism waged by social networked actors...

 -
Network address translation
Network address translation
In computer networking, network address translation is the process of modifying IP address information in IP packet headers while in transit across a traffic routing device....

 -
Network Control Program
Network Control Program
The Network Control Program provided the middle layers of the protocol stack running on host computers of the ARPANET, the predecessor to the modern Internet...

 -
Network File System -
Network Information Centre -
Network mapping
Network Mapping
Network mapping is the study of the physical connectivity of networks. Internet mapping is the study of the physical connectivity of the Internet. Network mapping often attempts to determine the servers and operating systems run on networks...

 -
Network News Transfer Protocol
Network News Transfer Protocol
The Network News Transfer Protocol is an Internet application protocol used for transporting Usenet news articles between news servers and for reading and posting articles by end user client applications...

 -
Network protocol design principles -
Network time protocol
Network Time Protocol
The Network Time Protocol is a protocol and software implementation for synchronizing the clocks of computer systems over packet-switched, variable-latency data networks. Originally designed by David L...

 -
News agency
News agency
A news agency is an organization of journalists established to supply news reports to news organizations: newspapers, magazines, and radio and television broadcasters. Such an agency may also be referred to as a wire service, newswire or news service.-History:The oldest news agency is Agence...

 -
News aggregator -
News client
News client
A newsreader is an application program that reads articles on Usenet . Newsreaders act as clients which connect to a news server, via the Network News Transfer Protocol , to download articles and post new articles...

 (newsreader) -
News server
News server
A news server is a set of computer software used to handle Usenet articles. It may also refer to a computer itself which is primarily or solely used for handling Usenet. A reader server provides an interface to read and post articles, generally with the assistance of a news client. A transit...

 -
Non-repudiation
Non-repudiation
Non-repudiation refers to a state of affairs where the purported maker of a statement will not be able to successfully challenge the validity of the statement or contract. The term is often seen in a legal setting wherein the authenticity of a signature is being challenged...

 -
Novell
Novell
Novell, Inc. is a multinational software and services company. It is a wholly owned subsidiary of The Attachmate Group. It specializes in network operating systems, such as Novell NetWare; systems management solutions, such as Novell ZENworks; and collaboration solutions, such as Novell Groupwise...

 -
NSD
NSD
In Internet computing, NSD is an open-source server program for the Domain Name System. It was developed by NLnet Labs of Amsterdam in cooperation with the RIPE NCC, from scratch as an authoritative name server...

 -
NSFNet
NSFNet
The National Science Foundation Network was a program of coordinated, evolving projects sponsored by the National Science Foundation beginning in 1985 to promote advanced research and education networking in the United States...

 -
NTLM
NTLM
In a Windows network, NTLM is a suite of Microsoft security protocols that provides authentication, integrity, and confidentiality to users....

 -
Nude celebrities on the Internet
Nude celebrities on the Internet
Imagery of nude celebrities is in widespread demand and is a lucrative business. Depictions of celebrities have been exploited by vendors of pornography and others in many different forms of media...


O

Online
ONLINE
ONLINE is a magazine for information systems first published in 1977. The publisher Online, Inc. was founded the year before. In May 2002, Information Today, Inc. acquired the assets of Online Inc....

 -
online banking
Online banking
Online banking allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank, credit union or building society.-Features:...

 -
Online Books Page
Online Books Page
The Online Books Page is an index of e-text books available on the Internet. It is edited by John Mark Ockerbloom and is hosted by the library of the University of Pennsylvania...

 -
Opencola
Opencola (company)
OpenCola was a Toronto-based software company founded in 1999 by Grad Conn, Cory Doctorow and John Henson to create "collaboration object lookup architecture" software, and sold in 2003. The software and specifications produced were all released as open source...

 -
Open mail relay
Open mail relay
An open mail relay is an SMTP server configured in such a way that it allows anyone on the Internet to send e-mail through it, not just mail destined to or originating from known users...

 -
Open shortest path first
Open Shortest Path First
Open Shortest Path First is an adaptive routing protocol for Internet Protocol networks. It uses a link state routing algorithm and falls into the group of interior routing protocols, operating within a single autonomous system . It is defined as OSPF Version 2 in RFC 2328 for IPv4...

 -
Open Site
Open Site
Open-Site, the Open Encyclopedia Project, is a free internet encyclopedia founded in 2002 by Michael J. Flickinger in an effort to build a free categorized community-built encyclopedia, inspired by the Open Directory Project...

 -
OpenNAP
Opennap
OpenNap is a peer-to-peer service server software. It was created as an open source Napster server, extending the Napster protocol to allow sharing of any media type, and adding the ability to link servers together.-History:...

 -
Opera (web browser)
Opera (web browser)
Opera is a web browser and Internet suite developed by Opera Software with over 200 million users worldwide. The browser handles common Internet-related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, chatting on IRC, downloading files via BitTorrent,...

 -
Organizations
Internet organizations
This is a list of Internet organizations, or organizations that play or played a key role in the evolution of the Internet by developing recommendations, standards, and technology; deploying infrastructure and services; and addressing other major issues....

 -
OS/390
OS/390
OS/390 is an IBM operating system for the System/390 IBM mainframe computers.OS/390 was introduced in late 1995 in an effort, led by the late Randy Stelman, to simplify the packaging and ordering for the key, entitled elements needed to complete a fully functional MVS operating system package...

 -
OSI model
OSI model
The Open Systems Interconnection model is a product of the Open Systems Interconnection effort at the International Organization for Standardization. It is a prescription of characterizing and standardizing the functions of a communications system in terms of abstraction layers. Similar...

 -
OSPF -
Out-of-band
Out-of-band
The term out-of-band has different uses in communications and telecommunication. In case of out-of-band control signaling, signaling bits are sent in special order in a dedicated signaling frame...


P

Packet radio
Packet radio
Packet radio is a form of packet switching technology used to transmit digital data via radio or wireless communications links. It uses the same concepts of data transmission via Datagram that are fundamental to communications via the Internet, as opposed to the older techniques used by dedicated...

 -
Packet switching
Packet switching
Packet switching is a digital networking communications method that groups all transmitted data – regardless of content, type, or structure – into suitably sized blocks, called packets. Packet switching features delivery of variable-bit-rate data streams over a shared network...

 -
Parasitic computing
Parasitic computing
Parasitic computing is programming technique where a program in normal authorized interactions with another program manages to get the other program to perform computations of a complex nature...

 -
Parental controls
Parental controls
Parental controls are features which may be included in digital television services, computer and video games, mobile phones and computer software...

 -
Paul Mockapetris
Paul Mockapetris
Dr. Paul V. Mockapetris is the inventor of the Domain Name System.In 1983, he proposed a Domain Name System architecture in RFCs 882 and 883 while at the Information Sciences Institute of the University of Southern California....

 -
Paul Vixie
Paul Vixie
Paul Vixie is an American Internet pioneer, the author of several RFCs and well-known Unix software.Vixie attended George Washington High School in San Francisco, California. He received a Ph.D in computer science from Keio University in 2011....

 -
PayPal
PayPal
PayPal is an American-based global e-commerce business allowing payments and money transfers to be made through the Internet. Online money transfers serve as electronic alternatives to paying with traditional paper methods, such as checks and money orders....

 -
Peer-to-peer
Peer-to-peer
Peer-to-peer computing or networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application...

 -
Peering
Peering
In computer networking, peering is a voluntary interconnection of administratively separate Internet networks for the purpose of exchanging traffic between the customers of each network. The pure definition of peering is settlement-free or "sender keeps all," meaning that neither party pays the...

 -
Pen pal
Pen pal
Pen pals are people who regularly write to each other, particularly via postal mail.-Purposes:A penpal relationship is often used to practice reading and writing in a foreign language, to improve literacy, to learn more about other countries and life-styles, and to make friendships...

 -
Perl
Perl
Perl is a high-level, general-purpose, interpreted, dynamic programming language. Perl was originally developed by Larry Wall in 1987 as a general-purpose Unix scripting language to make report processing easier. Since then, it has undergone many changes and revisions and become widely popular...

 -
Personal area network
Personal area network
A personal area network is a computer network used for communication among computer devices, including telephones and personal digital assistants, in proximity to an individual's body. The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters...

 -
Ping
Ping
Ping is a computer network administration utility used to test the reachability of a host on an Internet Protocol network and to measure the round-trip time for messages sent from the originating host to a destination computer...

 -
PKZIP
PKZIP
PKZIP is an archiving tool originally written by Phil Katz and marketed by his company PKWARE, Inc. The common "PK" prefix used in both PKZIP and PKWARE stands for "Phil Katz".-History:...

 -
Plug-and-play
Plug-and-play
In computing, plug and play is a term used to describe the characteristic of a computer bus, or device specification, which facilitates the discovery of a hardware component in a system, without the need for physical device configuration, or user intervention in resolving resource conflicts.Plug...

 -
Point-to-Point Protocol
Point-to-Point Protocol
In networking, the Point-to-Point Protocol is a data link protocol commonly used in establishing a direct connection between two networking nodes...

 -
Political media
Political media
Political media are communication vehicles owned, ruled, managed, or otherwise influenced by political entities, meant to propagate views of the related entity. A similar term, normative media, emphasizes technical and social characteristics of the media itself in shaping decisions...

 -
POP
Point of presence
A point of presence is an artificial demarcation point or interface point between communications entities. It may include a meet-me-room.In the US, this term became important during the court-ordered breakup of the Bell Telephone system...

 -
POP3
Post Office Protocol
In computing, the Post Office Protocol is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP and IMAP are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern...

 -
Port forwarding
Port forwarding
Port forwarding or port mapping is a name given to the combined technique of# translating the address and/or port number of a packet to a new destination# possibly accepting such packet in a packet filter...

 -
Port scan -
Pretty Good Privacy
Pretty Good Privacy
Pretty Good Privacy is a data encryption and decryption computer program that provides cryptographic privacy and authentication for data communication. PGP is often used for signing, encrypting and decrypting texts, E-mails, files, directories and whole disk partitions to increase the security...

 -
Primary mirror
Primary mirror
A primary mirror is the principal light-gathering surface of a reflecting telescope.-Description:The primary mirror of a reflecting telescope is a spherical or parabolic shaped disks of polished reflective metal , or in later telescopes, glass or other material coated with a reflective layer...

 -
Private IP address -
Project Gutenberg
Project Gutenberg
Project Gutenberg is a volunteer effort to digitize and archive cultural works, to "encourage the creation and distribution of eBooks". Founded in 1971 by Michael S. Hart, it is the oldest digital library. Most of the items in its collection are the full texts of public domain books...

 -
Protocol -
Protocol stack
Protocol stack
The protocol stack is an implementation of a computer networking protocol suite. The terms are often used interchangeably. Strictly speaking, the suite is the definition of the protocols, and the stack is the software implementation of them....

 -
Pseudonymous remailer
Pseudonymous remailer
A pseudonymous remailer or nym server, as opposed to an anonymous remailer, is an Internet software program designed to allow people to write pseudonymous messages on Usenet newsgroups and send pseudonymous email. Unlike purely anonymous remailers, it assigns its users a user name, and it keeps a...

 -
PSOS
PSOS
pSOS is a real time operating system , created in about 1982 by Alfred Chao, and developed/marketed for the first part of its life by his company Software Components Group...

 -
Psychological effects of Internet use -
Public switched telephone network
Public switched telephone network
The public switched telephone network is the network of the world's public circuit-switched telephone networks. It consists of telephone lines, fiber optic cables, microwave transmission links, cellular networks, communications satellites, and undersea telephone cables, all inter-connected by...

 -
Publishing
Publishing
Publishing is the process of production and dissemination of literature or information—the activity of making information available to the general public...


R

Red Hat
Red Hat
Red Hat, Inc. is an S&P 500 company in the free and open source software sector, and a major Linux distribution vendor. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North Carolina with satellite offices worldwide....

 -
Regex -
Regulation of Investigatory Powers Act 2000
Regulation of Investigatory Powers Act 2000
The Regulation of Investigatory Powers Act 2000 is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications...

 -
Request for Comments
Request for Comments
In computer network engineering, a Request for Comments is a memorandum published by the Internet Engineering Task Force describing methods, behaviors, research, or innovations applicable to the working of the Internet and Internet-connected systems.Through the Internet Society, engineers and...

 -
RIPE
RIPE
Réseaux IP Européens is a forum open to all parties with an interest in the technical development of the Internet. The RIPE community’s objective is to ensure that the administrative and technical coordination necessary to maintain and develop the Internet continues...

 -
RISC OS
RISC OS
RISC OS is a computer operating system originally developed by Acorn Computers Ltd in Cambridge, England for their range of desktop computers, based on their own ARM architecture. First released in 1987, under the name Arthur, the subsequent iteration was renamed as in 1988...

 -
Root nameserver
Root nameserver
A root name server is a name server for the Domain Name System's root zone. It directly answers requests for records in the root zone and answers other requests returning a list of the designated authoritative name servers for the appropriate top-level domain...

 -
Route analytics
Route analytics
Route analytics is an emerging network monitoring technology specifically developed to analyze the routing protocols and structures in meshed IP Networks...

 -
Routing
Routing
Routing is the process of selecting paths in a network along which to send network traffic. Routing is performed for many kinds of networks, including the telephone network , electronic data networks , and transportation networks...

 -
Routing information protocol
Routing Information Protocol
The Routing Information Protocol is a distance-vector routing protocol, which employs the hop count as a routing metric. RIP prevents routing loops by implementing a limit on the number of hops allowed in a path from the source to a destination. The maximum number of hops allowed for RIP is 15....

 -
RPC
Remote procedure call
In computer science, a remote procedure call is an inter-process communication that allows a computer program to cause a subroutine or procedure to execute in another address space without the programmer explicitly coding the details for this remote interaction...

 -
RSA -
RTP
Real-time Transport Protocol
The Real-time Transport Protocol defines a standardized packet format for delivering audio and video over IP networks. RTP is used extensively in communication and entertainment systems that involve streaming media, such as telephony, video teleconference applications, television services and...

 -
RTSP

S

SCADA
SCADA
SCADA generally refers to industrial control systems : computer systems that monitor and control industrial, infrastructure, or facility-based processes, as described below:...

 -
Scientology vs. the Internet -
scp
Secure copy
Secure Copy or SCP is a means of securely transferring computer files between a local and a remote host or between two remote hosts. It is based on the Secure Shell protocol....

 -
Script kiddie
Script kiddie
A script kiddie or skiddie, occasionally skid, script bunny, script kitty, script-running juvenile or similar, is a derogatory term used to describe those who use scripts or programs developed by others to attack computer systems and networks and deface websites.-Characteristics:In a Carnegie...

 -
Search engine
Search engine
A search engine is an information retrieval system designed to help find information stored on a computer system. The search results are usually presented in a list and are commonly called hits. Search engines help to minimize the time required to find information and the amount of information...

 -
Secret identity
Secret identity
A secret identity is an element of fiction wherein a character develops a separate persona , while keeping their true identity hidden. The character also may wear a disguise...

 -
Secure copy
Secure copy
Secure Copy or SCP is a means of securely transferring computer files between a local and a remote host or between two remote hosts. It is based on the Secure Shell protocol....

 -
Secure file transfer program
Secure file transfer program
The sftp command is a command-line interface client program implementing the client-side of the SSH File Transfer Protocol as implemented by the sftp-server command by the OpenSSH project, which runs inside the encrypted Secure Shell connection....

 -
Secure shell
Secure Shell
Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...

 -
Sequenced packet exchange -
Sergey Brin
Sergey Brin
Sergey Mikhaylovich Brin is a Russian-born American computer scientist and internet entrepreneur who, with Larry Page, co-founded Google, one of the largest internet companies. , his personal wealth is estimated to be $16.7 billion....

 -
Serial line IP -
SFTP
Simple File Transfer Protocol
Simple File Transfer Protocol, as defined by RFC 913, was proposed as an file transfer protocol with a level of complexity intermediate between TFTP and FTP....

 -
Signalling System 7
Signalling System 7
Signalling System No. 7 is a set of telephony signaling protocols which are used to set up most of the world's public switched telephone network telephone calls. The main purpose is to set up and tear down telephone calls...

 -
Simple network management protocol
Simple Network Management Protocol
Simple Network Management Protocol is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." It is used mostly in network management systems to monitor...

 -
Slashdot effect
Slashdot effect
The Slashdot effect, also known as slashdotting, occurs when a popular website links to a smaller site, causing a massive increase in traffic. This overloads the smaller site, causing it to slow down or even temporarily close. The name stems from the huge influx of web traffic that results from...

 -
SLIP
Slip
- In science and technology :* Slip , an aqueous suspension of minerals, and frequently deflocculant.* Slip , a positional displacement in a sequence of transmitted symbols...

 -
SMB
Server Message Block
In computer networking, Server Message Block , also known as Common Internet File System operates as an application-layer network protocol mainly used to provide shared access to files, printers, serial ports, and miscellaneous communications between nodes on a network. It also provides an...

 -
Smiley
Smiley
A smiley, smiley face, or happy face, is a stylized representation of a smiling human face, commonly occurring in popular culture. It is commonly represented as a yellow circle with two black dots representing eyes and a black arc representing the mouth...

 -
Simple File Transfer Protocol
Simple File Transfer Protocol
Simple File Transfer Protocol, as defined by RFC 913, was proposed as an file transfer protocol with a level of complexity intermediate between TFTP and FTP....

 -
SMTP
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today...

 -
Social engineering (computer security) -
Software development kit
Software development kit
A software development kit is typically a set of software development tools that allows for the creation of applications for a certain software package, software framework, hardware platform, computer system, video game console, operating system, or similar platform.It may be something as simple...

 -
Sohonet
Sohonet
Sohonet is a community-of-interest network for the television, film and media production community.Founded in 1995 by a group of Soho-based post-production companies, Sohonet links many of the British film studios to London's post-production community...

 -
Spam
Spam (electronic)
Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately...

 -
SPX -
Spyware
Spyware
Spyware is a type of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's...

 -
SQL slammer worm -
SSH
Secure Shell
Secure Shell is a network protocol for secure data communication, remote shell services or command execution and other secure network services between two networked computers that it connects via a secure channel over an insecure network: a server and a client...

 -
SSH File Transfer Protocol
SSH file transfer protocol
In computing, the SSH File Transfer Protocol is a network protocol that provides file access, file transfer, and file management functionality over any reliable data stream...

 -
Stateful firewall
Stateful firewall
In computing, a stateful firewall is a firewall that keeps track of the state of network connections traveling across it. The firewall is programmed to distinguish legitimate packets for different types of connections...

 -
Stateless firewall -
Steganography
Steganography
Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity...

 -
Stub network
Stub network
A stub network is a somewhat casual term describing a computer network, or part of an internetwork, with no knowledge of other networks, that will typically send much or all of its non-local traffic out via a single path, with the network aware only of a default route to non-local destinations...


T

Taipei 101
Taipei 101
Taipei 101 , formerly known as the Taipei World Financial Center, is a landmark skyscraper located in Xinyi District, Taipei, Taiwan. The building ranked officially as the world's tallest from 2004 until the opening of the Burj Khalifa in Dubai in 2010...

 -
TCP
Transmission Control Protocol
The Transmission Control Protocol is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol , and therefore the entire suite is commonly referred to as TCP/IP...

 -
TCP and UDP port numbers -
Ted Nelson
Ted Nelson
Theodor Holm Nelson is an American sociologist, philosopher, and pioneer of information technology. He coined the terms "hypertext" and "hypermedia" in 1963 and published it in 1965...

 -
Telecommunication
Telecommunication
Telecommunication is the transmission of information over significant distances to communicate. In earlier times, telecommunications involved the use of visual signals, such as beacons, smoke signals, semaphore telegraphs, signal flags, and optical heliographs, or audio messages via coded...

 -
Telecommunications network
Telecommunications network
A telecommunications network is a collection of terminals, links and nodes which connect together to enable telecommunication between users of the terminals. Networks may use circuit switching or message switching. Each terminal in the network must have a unique address so messages or connections...

 -
Telecommunications traffic engineering -
Teledesic
Teledesic
Teledesic was a company founded in the 1990s to build a commercial broadband satellite constellation for Internet services. Using low-earth orbiting satellites small antennas could be used to provide uplinks of as much as 100 Mbit/second and downlinks of up to 720 Mbit/second...

 -
Telegraphy
Telegraphy
Telegraphy is the long-distance transmission of messages via some form of signalling technology. Telegraphy requires messages to be converted to a code which is known to both sender and receiver...

 -
Teleprinter
Teleprinter
A teleprinter is a electromechanical typewriter that can be used to communicate typed messages from point to point and point to multipoint over a variety of communication channels that range from a simple electrical connection, such as a pair of wires, to the use of radio and microwave as the...

 -
Telnet
TELNET
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection...

 -
The Cathedral and the Bazaar
The Cathedral and the Bazaar
The Cathedral and the Bazaar is an essay by Eric S. Raymond on software engineering methods, based on his observations of the Linux kernel development process and his experiences managing an open source project, fetchmail. It examines the struggle between top-down and bottom-up design...

 -
Think tank
Think tank
A think tank is an organization that conducts research and engages in advocacy in areas such as social policy, political strategy, economics, military, and technology issues. Most think tanks are non-profit organizations, which some countries such as the United States and Canada provide with tax...

 -
Thunderbird
Mozilla Thunderbird
Mozilla Thunderbird is a free, open source, cross-platform e-mail and news client developed by the Mozilla Foundation. The project strategy is modeled after Mozilla Firefox, a project aimed at creating a web browser...

 -
Time to live
Time to live
Time to live is a mechanism that limits the lifespan of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded. In computer networking, TTL prevents a data...

 -
Timeline of communication technology
Timeline of communication technology
Timeline of communication technology* Prior to 3500BC - Communication was carried out through paintings of indigenous tribes.* 3500s BC - The Sumerians develop cuneiform writing and the Egyptians develop hieroglyphic writing...

 -
Timeline of computing 1950-1979
Timeline of computing 1950-1979
This article presents a timeline of events in the history of computing from 1950 to 1979. For a narrative explaining the overall developments, see the related history of computers and history of computer science....

 -
Timeline of computing 1980-1989
Timeline of computing 1980-1989
This article presents a timeline of events in the history of computing from 1980 to 1989. For a narrative explaining the overall developments, see the related history of computers and history of computer science....

 -
Tiscali
Tiscali
Tiscali may refer to:*Tiscali, an archaeological village of Nuragici people, in Sardinia, Italy, notable because it was completely inside a huge cavern*Tiscali SpA, a telecom company based in Italy*Tiscali TV , multiple uses...

 -
Token ring -
Top-level domain
Top-level domain
A top-level domain is one of the domains at the highest level in the hierarchical Domain Name System of the Internet. The top-level domain names are installed in the root zone of the name space. For all domains in lower levels, it is the last part of the domain name, that is, the last label of a...

 -
Traceroute
Traceroute
traceroute is a computer network diagnostic tool for displaying the route and measuring transit delays of packets across an Internet Protocol network. Traceroute is available on most operating systems....

 -
Transmission Control Protocol
Transmission Control Protocol
The Transmission Control Protocol is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol , and therefore the entire suite is commonly referred to as TCP/IP...

 -
Transmission system
Transmission system
In telecommunications a transmission system is a system that transmits a signal from one place to another. The signal can be an electrical, optical or radio signal....

 -
Transport Layer Security
Transport Layer Security
Transport Layer Security and its predecessor, Secure Sockets Layer , are cryptographic protocols that provide communication security over the Internet...

 -
Trusted computing
Trusted Computing
Trusted Computing is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has a specialized meaning. With Trusted Computing, the computer will consistently behave in expected ways, and those behaviors will be enforced by...

 -
TTL
Time to live
Time to live is a mechanism that limits the lifespan of data in a computer or network. TTL may be implemented as a counter or timestamp attached to or embedded in the data. Once the prescribed event count or timespan has elapsed, data is discarded. In computer networking, TTL prevents a data...


U

UDDI -
UKP
UKP
UKP may refer to:* Ukrainian Communist Party* Pound sterling, but the actual ISO 4217 code is GBP* The Unbounded Knapsack problem.* Ubiquitous Knowledge Processing Lab...

-
Ultrix
Ultrix
Ultrix was the brand name of Digital Equipment Corporation's native Unix systems. While ultrix is the Latin word for avenger, the name was chosen solely for its sound.-History:...

 -
Ungermann-Bass
Ungermann-Bass
Ungermann-Bass, also known as UB and UB Networks, was a computer networking company in the 1980s to 1990s. Located in Santa Clara, California, in Silicon Valley, UB was the first large networking company independent of any computer manufacturer. UB was founded by Ralph Ungermann and Charlie Bass...

 -
Uniform Resource Identifier
Uniform Resource Identifier
In computing, a uniform resource identifier is a string of characters used to identify a name or a resource on the Internet. Such identification enables interaction with representations of the resource over a network using specific protocols...

 -
Uniform Resource Locator
Uniform Resource Locator
In computing, a uniform resource locator or universal resource locator is a specific character string that constitutes a reference to an Internet resource....

 -
Universal Plug and Play
Universal Plug and Play
Universal Plug and Play is a set of networking protocols for primarily residential networks without enterprise class devices that permits networked devices, such as personal computers, printers, Internet gateways, Wi-Fi access points and mobile devices to seamlessly discover each other's presence...

 -
University of California, Berkeley
University of California, Berkeley
The University of California, Berkeley , is a teaching and research university established in 1868 and located in Berkeley, California, USA...

 -
Usenet
Usenet
Usenet is a worldwide distributed Internet discussion system. It developed from the general purpose UUCP architecture of the same name.Duke University graduate students Tom Truscott and Jim Ellis conceived the idea in 1979 and it was established in 1980...

 -
Usenet cabal -
USENET Cookbook
USENET Cookbook
The USENET Cookbook was an experiment in electronic publishing conducted by Brian Reid in 1985-1987, several years before the Web. Reid distinguishes between electronic printing and electronic publishing .The USENET cookbook was a collaboratively-produced cookbook...

 -
User datagram protocol
User Datagram Protocol
The User Datagram Protocol is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol network without requiring...

 -
UTF-16 -
UUCP
UUCP
UUCP is an abbreviation for Unix-to-Unix Copy. The term generally refers to a suite of computer programs and protocols allowing remote execution of commands and transfer of files, email and netnews between computers. Specifically, a command named uucp is one of the programs in the suite; it...


V

vCard
VCard
vCard is a file format standard for electronic business cards. vCards are often attached to e-mail messages, but can be exchanged in other ways, such as on the World Wide Web or Instant Messaging...

 -
Victorian Internet
Victorian Internet
The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-Line Pioneers is a 1998 book by Tom Standage. It is about the development and uses of the electric telegraph during the second half of the 19th Century and some of the similarities the telegraph shared...

 -
Vint Cerf
Vint Cerf
Vinton Gray "Vint" Cerf is an American computer scientist, who is recognized as one of "the fathers of the Internet", sharing this title with American computer scientist Bob Kahn...

 -
Virtual community
Virtual community
A virtual community is a social network of individuals who interact through specific media, potentially crossing geographical and political boundaries in order to pursue mutual interests or goals...

 -
Voice over IP
Voice over IP
Voice over Internet Protocol is a family of technologies, methodologies, communication protocols, and transmission techniques for the delivery of voice communications and multimedia sessions over Internet Protocol networks, such as the Internet...


W

WAP
Wireless Application Protocol
Wireless Application Protocol is a technical standard for accessing information over a mobile wireless network.A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.Before the introduction of WAP, mobile service providers had limited opportunities to offer...

 -
WAI
Wai
Wai or WAI may refer to:*Wai, Maharashtra, a town in India*Wai, an alternative name for the Nuristani people, speakers of the Waigali language*NO WAI, a phrase that is part of the O RLY? Internet meme.*Wai, a form of Thai greeting...

 -
War driving -
Warez
Warez
Warez refers primarily to copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. The term generally refers to unauthorized releases by organized groups, as opposed to file sharing between friends or large groups of people with similar...

 -
Warhol worm
Warhol worm
A Warhol worm is an extremely rapidly propagating computer worm that spreads as fast as physically possible, infecting all vulnerable machines on the entire Internet in 15 minutes or less. The term is based on Andy Warhol's remark that "In the future, everyone will have 15 minutes of fame". The...

 -
WAV
WAV
Waveform Audio File Format , is a Microsoft and IBM audio file format standard for storing an audio bitstream on PCs...

 -
Web 2.0
Web 2.0
The term Web 2.0 is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design, and collaboration on the World Wide Web...

 -
Web annotation
Web annotation
A web annotation is an online annotation associated with a web resource, typically a web page. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself...

 -
Web application
Web application
A web application is an application that is accessed over a network such as the Internet or an intranet. The term may also mean a computer software application that is coded in a browser-supported language and reliant on a common web browser to render the application executable.Web applications are...

 -
Web browser
Web browser
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier and may be a web page, image, video, or other piece of content...

 -
Web commerce
Web commerce
Web commerce is a form of electronic commerce that is conducted primarily through the World Wide Web, but may also use email and other aspects of the Internet....

 -
Web design
Web design
Web design is the process of planning and creating a website. Text, images, digital media and interactive elements are used by web designers to produce the page seen on the web browser...

 -
Web directory
Web directory
A web directory or link directory is a directory on the World Wide Web. It specializes in linking to other web sites and categorizing those links....

 -
Web hosting -
Web portal
Web portal
A web portal or links page is a web site that functions as a point of access to information in the World Wide Web. A portal presents information from diverse sources in a unified way....

 -
Web server
Web server
Web server can refer to either the hardware or the software that helps to deliver content that can be accessed through the Internet....

 -
Web service
Web service
A Web service is a method of communication between two electronic devices over the web.The W3C defines a "Web service" as "a software system designed to support interoperable machine-to-machine interaction over a network". It has an interface described in a machine-processable format...

 -
Web traffic
Web traffic
Web traffic is the amount of data sent and received by visitors to a web site. It is a large portion of Internet traffic. This is determined by the number of visitors and the number of pages they visit...

 -
Web television
Web television
Web television, also commonly referred to as web TV, not to be confused with WebTV, Internet television or catch up TV, is an emerging genre of digital entertainment that is distinct from traditional broadcast television...

 -
Webcam
Webcam
A webcam is a video camera that feeds its images in real time to a computer or computer network, often via USB, ethernet, or Wi-Fi.Their most popular use is the establishment of video links, permitting computers to act as videophones or videoconference stations. This common use as a video camera...

 -
WebDAV
WebDAV
Web-based Distributed Authoring and Versioning is a set of methods based on the Hypertext Transfer Protocol that facilitates collaboration between users in editing and managing documents and files stored on World Wide Web servers...

 -
Webmail -
Webpage -
WebQuest
WebQuest
A WebQuest, according to WebQuest.org, is an inquiry-oriented lesson format in which most or all the information that learners work with comes from the web...

 -
Website
Website
A website, also written as Web site, web site, or simply site, is a collection of related web pages containing images, videos or other digital assets. A website is hosted on at least one web server, accessible via a network such as the Internet or a private local area network through an Internet...

 -
Whois
WHOIS
WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block, or an autonomous system, but is also used for a wider range of other information. The protocol stores...

 -
Wi-Fi
Wi-Fi
Wi-Fi or Wifi, is a mechanism for wirelessly connecting electronic devices. A device enabled with Wi-Fi, such as a personal computer, video game console, smartphone, or digital audio player, can connect to the Internet via a wireless network access point. An access point has a range of about 20...

 -
Wide area information server
Wide area information server
Wide Area Information Servers or WAIS is a client–server text searching system that uses the ANSI Standard Z39.50 Information Retrieval Service Definition and Protocol Specifications for Library Applications" to search index databases on remote computers...

 -
Wide area network
Wide area network
A wide area network is a telecommunication network that covers a broad area . Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations...

 -
Wiki software
Wiki software
Wiki software is collaborative software that runs a wiki, i.e., a website that allows users to create and collaboratively edit web pages via a web browser. A wiki system is usually a web application that runs on one or more web servers...

 -
Wikipedia
Wikipedia
Wikipedia is a free, web-based, collaborative, multilingual encyclopedia project supported by the non-profit Wikimedia Foundation. Its 20 million articles have been written collaboratively by volunteers around the world. Almost all of its articles can be edited by anyone with access to the site,...

 -
WikiWikiWeb
WikiWikiWeb
WikiWikiWeb is a term that has been used to refer to four things: the first wiki, or user-editable website, launched on 25 March 1995 by Ward Cunningham as part of the Portland Pattern Repository ; the Perl-based application that was used to run it, also developed by Cunningham, which was the first...

 -
Windows 3.x
Windows 3.1x
Windows 3.1x is a series of 16-bit operating systems produced by Microsoft for use on personal computers. The series began with Windows 3.1, which was first sold during March 1992 as a successor to Windows 3.0...

 -
Winsock
Winsock
In computing, the Windows Sockets API , which was later shortened to Winsock, is a technical specification that defines how Windows network software should access network services, especially TCP/IP. It defines a standard interface between a Windows TCP/IP client application and the underlying...

 -
Wireless access point
Wireless access point
In computer networking, a wireless access point is a device that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards...

 -
Wireless Application Protocol
Wireless Application Protocol
Wireless Application Protocol is a technical standard for accessing information over a mobile wireless network.A WAP browser is a web browser for mobile devices such as mobile phones that uses the protocol.Before the introduction of WAP, mobile service providers had limited opportunities to offer...

 -
Wireless community network
Wireless community network
Wireless community networks or wireless community projects are the organizations that attempt to take a grassroots approach to providing a viable alternative to municipal wireless networks for consumers....

 -
World Wide Web
World Wide Web
The World Wide Web is a system of interlinked hypertext documents accessed via the Internet...

 -
WorldForge
WorldForge
The WorldForge project is producing an open source framework for massively multiplayer online role-playing games. The intent lies in creating a widely used development framework and set of libraries by motivating interested developers to improve on the original code.-History:The WorldForge Project...


X

X.25
X.25
X.25 is an ITU-T standard protocol suite for packet switched wide area network communication. An X.25 WAN consists of packet-switching exchange nodes as the networking hardware, and leased lines, Plain old telephone service connections or ISDN connections as physical links...

 -
XDR
External Data Representation
External Data Representation is a standard data serialization format, for uses such as computer network protocols. It allows data to be transferred between different kinds of computer systems. Converting from the local representation to XDR is called encoding. Converting from XDR to the local...

 -
Xerox Network Systems -
XML
XML
Extensible Markup Language is a set of rules for encoding documents in machine-readable form. It is defined in the XML 1.0 Specification produced by the W3C, and several other related specifications, all gratis open standards....

 -
XS4ALL
XS4ALL
XS4ALL is the third-oldest Internet service provider in the Netherlands, after NLnet and SURFnet. However, XS4ALL was the first company to offer Internet access to individuals, since 1993...


See also

:Category:Computing terminology
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK