Prudens Information Resources for the Internet

Glossary

Every term used on the PIRI website is defined in this glossary, or in the following basic reports:

E-Business Basics | Internet Basics

There are also sub-glossaries for the following information categories:

Computing, Software & Infrastructure | E-Business | Identity, E-Security & E-Crime | Knowledge Representation

Access Grid
Adware
Agent
API
Application Programming Interface (API)
Application Service Provider (ASP)
Asynchronous/Synchronous Communications
Auction Fraud
Authentication
Avatar
Back-end Business Operations
Banner Ad
Bioinformatics
Biometrics
Binary Large Object (BLOB)
Bot
Botnets
Break-even Analysis
Bulletin Board
Business Intelligence (BI)
Business Model
Business Plan
Business Process Management (BPM)
Buyer Aggregation
Buying Community
Cash Flow
Certificate Authority
CGI
Clickstream Data & Surveillance
Cluster Computing
Common Gateway Interface (CGI)
Competencies
Competitive Advantage
Computational Cluster
Computational Grid
Computing-on-Demand
Content & Media
Cookie
CPU Scavenging
Cracker/Hacker
Credit Card Fraud
CRM
Customer Relationship Management (CRM)
Cyberinfrastructure
Cycle Scavenging
Daemon
Dashboard
Data Center
Data Grid
Data Mining
Data Warehouse
Database
DDOS
Dedicated Grid
Deep Link
Deep Web
Demand Aggregation
Denial of Service (DOS)
Digital Archive
Digital Cash
Digital Cash Transfer System
Digital Certificate
Digital Coins
Digital Compression
Digital Coupon
Digital Divide
Digital Exchange / Digital Marketplace
Digital Goods
Digital Library
Digital Money
Digital Object Identifier
Digital Rights Management (DRM)
Digital Signature
Digital Vault / Digital Wallet
Digital Watermark
Directory/Directory Service
Directory Server
Discussion Group / Newsgroup
Disruptive Technologies
Distributed Computing
Distributed Denial-of-Service (DDOS)
Document Schema Definition Langauge
Document Type Definition (DTD)
DOI
Dot-Com
DRM
DSDL
DTD
Dublin Core Metadata System
Dynamic Pricing
e-Business Concept
e-Business Model
e-Business Strategies
e-Cash
e-Catalog
e-Crime
EDI
e-Infrastructure
Electronic Cash
Electronic Data Interchange (EDI)
Electronic Product Code (EPC)
Electronic Theft
Electronic Performance Support System (EPSS)
Encryption
End-to-End Principle
Enterprise Resource Planning (ERP)
EPSS
e-Research
ERP
e-Science
e-Workflow
Extensible
Extensible Mark-up Language (XML)
FAQs
Federated Identity
Fiber Optics
Fire Wall
First and Second Mover Advantage
Forensics, Digital
Frequently Asked Questions (FAQs)
Front-end & Back-end Business Operations
FUD
Goals & Objectives
Grid Computing
Grid Services
Groupware
Hacker
Hidden Web
Holograph
Honeypot Defense
Hyperlink
Identity Management
Identity Service Provider
Identity Theft
IETM
Implementation Planning
Industry Analysis/Competitive Analysis
Informatics
Information Architecture
Information Grid
Instant Messaging (IM)
Intellectual Capital
Intellectual Property
Intelligent Agent
Interactive Electronic Technical Manual (IETM)
Intermediary
Internet of Things
Internet Zero
Invisible Web
Key Performance Indicators
Knowledge Grid
Knowledge Management
Knowledge Representation
Knowledgebase
Latency
LDAP
Learning Grid
Learning Management System (LMS)
Legacy Systems
Lightweight Directory Access Protocol (LDAP)
Living Web
LMS
Logic Bomb
Lurking
M2M Communications
Market Research & Analysis
Media
MEMS
Mesh Communications
Metadata
Metadata Systems
Meta-Directory
Metcalfe's Law
Micro-Electronic Mechanical Systems (MEMS)
Micropayment
Middleware
Mission Statement
Mobile Access Code
MP3/MPEG3
MUD/MOO
Multimedia
Network Dominance
Network Operating System (NOS)
Network Robots
Newsgroups
Objectives /Performance Criteria
Online Analytical Processing (OLAP)
Online Chat
Online Fraud
Online Money Laundering
Ontology
Ontology Language Descriptions
Open Grid Services Architecture (OGSA)
Open Grid Services Infrastructure (OGSI)
Open Source
Organizational Learning
OWL
Parallel Programming
Persistent Uniform Resource Locator (PURL)
Piracy
PKI
Portal
Profile/Profiling
Provisioning
Public Grid
Public Key Infrastructure (PKI)
PURL
Radio Frequency Identification (RFID)
RDF
Research Grid
Resource Description Framework (RDF)
Return on Investment (ROI)
Rich Media
Risk Analysis
Roadmap
RSS
Scientific Grid
Scorecard
Secure Electronic Transaction (SET)
Secure Payment Systems
Secure Sockets Layer (SSL)
Self-Propogating Worms
Semantic Grid
Semantic Web
Semantic Web Services
Server Farm
Service Discovery
Service-Oriented Architecture (SOA)
Shopping Cart Abandonment
Short Message Service (SMS)
Simple Object Access Protocol (SOAP)
Single Sign-On
Smart Card
Smart Dust
Sniffer
Social Networking
Spyware
Standard Generalized Markup Language (SGML)
Style Sheets
Supercluster
Supercomputer
Supply Chain
SWOT Analysis
Tarpit Defense
Taxonomy
Telematics
Topic Map
Trojan Horse
Uniform Resource Identifier (URI)
Universal Description, Discovery, and Integration (UDDI)
Utility Computing
Value-Added Network
Value Chain
Value Network
Value Proposition
Value Shop
Value Web
Virtual Reality
Virtualization
Virus
Vision / Vision Statement
Web Analytics
Web Content Management (WCM)
Web Crawler
Web Log or Blog
Web Mining
Web Ontology Language (OWL)
Web Services
Web Services Description Language (WSDL)
Web Site Intrusion
Wiki
WiMax
Workflow
WSDL
XML
XML Schema
Zombie


Prudens Home | e-Reports | Knowledgebase | Books | Glossary


This web site is maintained by Burke Technology Services. Copyright © 2005-2006 PIRI. All rights reserved.