As a verb, it can mean any of the following actions: to read the contents of a certain file; to start or launch a computer application or software program; to maximize or restore a window of an already running computer program; or to make an object accessible. For example, "Open this file in Microsoft Word" means that you should use that application to read and/or make changes to that particular file. When used to describe standards or designs or source code or architecture, "open" means public.
The appeal of all of this is the immediacy and portability. Because microposts are so brief (typically 140 � 200 characters), a microblogger can update his or her microblog often enough to keep readers informed as to whatever they're doing (commonly known as twittering).
Thought of as a convergence of several types of "presence" technology, Twitter users have come up with new terms to differentiate the practice. Posts are called "tweets," and the community is known as the "twitosphere." Posts submitted can't be edited or deleted; posts that are regretted are called "mistweets." The Twitter site includes a simple API (application-programming interface) that twitterers, as they call themselves, can use to create their own applications. One such application, for example, a mash-up with Google Maps called Twittervision, shows users the geographical location of posters. Hey, GFI!
A Word on Traffic:
It's easy to get dazzled by the notion of "traffic" and to assume that the more hits you're getting on the site, the better the site is performing. However, it's not uncommon for high-traffic business sites to perform poorly when it comes to sales conversions. What really matters to a business isn't the total number of visitors your site receives, but the number of relevant, qualified visitors. For example, a site that converts 25 out of 100 visitors into customers is significantly more effective than one that converts 10 out of 1,000 visitors. In other words, higher traffic can provide a great ego boost, but it doesn't necessarily improve your bottom line.
Computer media used for social purposes, as a means of exchange, collaboration, and the social construction of knowledge.
Computer conferencing would be a perfect example of "sociomedia". Suggested by hypermedia theorist Edward Barrett in his book of the same name.
A method of transmitting light beams along optical fibers (which are actually bundles of glass). Optical fibers are intended to replace the copper wires employed in electronic networks. A light beam, such as that produced by a laser, can be modulated to carry data (information), and the result is very effective: high-speed transmission, clear signals, multiple streams of data, cost-effective performance. In fact, it's been said that fiber-optic technology is the greatest transmission medium currently known.
Web design and Web programming are often referred to as the two main parts of the Web development process. Web design refers to the visual, structural and navigational aspects of Web projects, while Web programming refers to the technical aspects (coding and Web server configuration). In reality Web design and Web programming are inter-related, since Web design is essentially impossible without Web programming and Web programming is a tool available for Web design.
A microchip for encoding information, it was originally intended so that the U.S. federal government could tap telephone calls in order to track criminal activity; it never became a standard, due to obvious civil liberty issues, and is now considered dead technology.
A nickname for a high-energy city with a heavy concentration of high-tech firms, easily accessible outdoor amenities, and a large number of coffeehouses. Examples include Austin, Texas, and Boulder, Colorado.
A market research technique in which a researcher goes out into the real world to see "what's cool" among the younger generation. A person who knows how to unearth new ideas and spot trends before others do is known as an "innovation scout." Check out the links below ;-)
A technology for enabling two high-speed, bidirectional data control channels for video, audio, and text transmission over T1 lines. It is expected to be configured for interactive network television, depending on HDSL equipment availability.
A high-tech, creative team that tackles a problem in its own style. A skunkworks team usually possesses one or all of the following characteristics: a unique brand of management, as far from traditional structure as possible; a small and focused core group of people with no internal management hierarchy; a significant contribution from renegade programmers who work around the clock until the project is done; a unified desire to accomplish the goal without letting red tape or bureaucracy get in the way; and a level of secrecy from the corporation maintained until the first level of success is achieved.
One of several methods for determining how your keystrokes and screen interact with a public-access site'soperating system. Most communications programs offer a choice of emulations that let you mimic the kind of keyboard that is directly attached to the host system computer.
The reverse process of finding out who is hacking into a system. Attacks can usually be traced back to a computer or pieced together from "electronic bread crumbs" unknowingly left behind by a cracker.
A numbering system with a base (radix) of 2, it is unlike the numbering systems most of us use, which have bases of 10 (decimal numbers), 12 (measurement in feet and inches), and 60 (time). Binary numbers are preferred for computers, for precision and economy. Building an electronic circuit that can detect the difference between two states (high current and low current, or 0 and 1) is easier and less expensive than building circuits that detect the difference among 10 states (0 through 9).
Developed by CompuServe, using file compression technology from Unisys, this is a graphics file format used on the Internet. It was originally referred to as a "CompuServe Bitmap" but it stands for "Graphics Interchange Format." You may hear GIF mentioned as "GIF format" (this is redundant, but it is widely used). On Web pages, the images (or pictures) you see are usually in GIF because the files are small and can be downloaded quickly. Another type of graphics format commonly used online is JPG; these files download even faster and contain a better resolution. However, JPGs cannot be "interlaced," so many Web authors use GIFs instead, to get that "melting onto the screen" effect that happens with interlaced images. Following are special kinds of GIF:
Animated GIF - a series of static images are displayed one after another or on top of each other, giving the effect of motion or animation.
Interlaced GIF - these appear first with poor resolution and then gain resolution once the entire image has arrived, as opposed to arriving linearly from the top row to the bottom row. This type of format is good for giving the user a quick idea of what the entire image will look like while they're waiting for the rest of the image to load.
Transparent GIF - useful because they appear to blend in smoothly with the Web page's background, even if the user has set a background color that differs from the one the developer expected. To make a GIF see-through or appear to be the same color as the background, you must assign one color to be transparent; if the Web browser supports transparency, that color will be replaced by the browser's background color, whatever it may be.
A popular term used to describe a person who knows a lot about computers and/or the Internet. In the past, it was considered somewhat derogatory to call someone "a geek," but now that the Internet has made computer usage mainstream, even computer savvy grrls affectionately call themselves "geeks."
Unconventional marketing programs designed to get maximum results out of minimal resources. Guerilla marketing by definition means making an investment in marketing with your time, energy, and imagination rather than merely your money. Coined by Jay Conrad Levinson, guerilla marketing is more about matching wits than matching budgets. Popular with the SOHO market, online tactics include newsletters, making use of e-mail lists, making appropriate newsgroup postings, sending out multiple press release announcements, establishing a dynamicWeb site, submitting to the search engines, posting content such as product reviews, getting your business listed in all the appropriate places, and so on (as opposed to buying superbowl ads or investing in ad banners).
The process of removing a domain name and its corresponding record from the Domain Name System (DNS) and InterNIC's domain name database. A deleted domain name cannot be used to locate computers on the Internet and will be made available for other parties to register on a first-come, first-served basis. A domain name may be deleted at the request of the domain name registrant or as a result of nonpayment. To "delete" something is to manually remove it.
In Unix, DOS, Windows, OS/2, and other operating systems , it is a way of stringing two programs together so that the output of one is fed to the other as input. "Pipe" is also a name for the |-beam character (|) and is used as slang for cable (see: fat pipes).
The techie deep within each of us. It's what we turn to when we're searching for that abstract clue to help us unlock the secret to our favorite game or when we're trying to remember how we did something in a software program. For example, "If I could just get in touch with my 'inner geek,' I could reach the next level."
The name for a cord or strap that is worn around the neck to hold an identification badge, whistle, keys, cell phone, thumb drive or other small object.
Lanyards come in various colors and types and can also be used as a tchotchke: an advertising tool with� customized logo or name printed on the strap. However it's totally geeky to walk around with a lanyard so you may want to take it off when venturing out into the real world otherwise you will be typecast as a modern version of the plastic pocket-protector set.
A lanyard can also come with different hardware. The O-ring is common for using with a whistle or keys. It may also have a split-connector so that it is easily removed and snapped back into place. A swivel snaphook is good for ID badges that have a rectangular hole at the top, and the bulldog clip is the type that when squeezed, both serrated jaws open, similar to how an alligator clip works.
Lanyards are used by businesses, schools, hospitals, at special events, conventions, reunions, in many recreational activities, and for backstage passes, etc., and because they are conveniently worn around the neck, they are considered more convenient than the clip style (which results in the dreaded wall humping).�
One of several industry jargon terms to describe "the best" of something within its niche, such as a new company, a new application, or a new management. Most often, it refers to the top software or hardware in a particular class, or to the top company or VC firm in a particular industry. Companies usually make their software purchases through a variety of vendors to acquire the best-in-breed for each application as it is very rare that one company can excel in every area.
All the people and companies that serve, support, or develop the Internet. This particular industry includes software companies, hardware companies, networking companies, content companies, ISPs, OSPs, online advertising agencies, dot-com businesses, venture capital firms, technical recruiting agencies, new media consultants, high-tech journalists, telecommunication companies, fiber-optics manufacturers, voice recognition developers, e-mail marketing companies, and thousands of businesses that capitalize on a high-speed network known as the Internet. These businesses are located all over the world, with a heavy concentration in the new economy hotspots. Many are listed on the Nasdaq or the New York Stock Exchange.
That sick feeling you get when you wake up one morning and find your industry being dominated by a Web-based retailer, or etailer. It's a little less frightening now that multi-channel business models are back in vogue.
A play on words, it refers to electronic retailing. An etailer leverages electronic media and Internet technologies to sell goods and products online. Many etailers do not have a brick-and-mortar counterpart. Etailing is considered a B2C form of e-commerce.
Hacker jargon used to describe one who breaks security on a system. This term was coined circa 1985 by hackers in defense against journalistic misuse of the word "hacker." While it is expected that hackers will have done some playful cracking, most outgrow the desire to break security (except perhaps to get some work done). Crackers tend to gather in small, secretive groups that have little overlap with hacker culture. They like to describe themselves as hackers (but hackers consider them lame). A cracker is also one who can crack a software program.
On the Internet, content delivery is the service of copying the pages of a Web site to geographically dispersed servers. When a page is requested, content is dynamically identified and served from the closest server to the user, enabling faster delivery. Typically, Internet Service Providers (ISPs) and the owners of high-traffic Web sites hire the services of a company to provide content delivery. A common content delivery approach is the placement of cache servers at major Internet access points around the world. A special routing code redirects a Web page request to the closest server. When the Web user clicks on a URL that is content-delivery enabled, the content delivery network re-routes that user's request away from the site's originating server, sending it to the cache server closest to the user. The cache server determines what content in the request exists in the cache, serves that content, and retrieves any non-cached content from the originating server. Any new content is also cached locally.
Other than faster loading times, the process is generally transparent to the user, except that the URL served may be different than the one requested. The three main techniques for content delivery are HTTP redirection, Internet Protocol (IP) redirection, and Domain Name System (DNS) redirection. In general, DNS redirection is the most effective technique. Content delivery can also be used for specific high-traffic events, such as live Web broadcasts, by continually dispersing content from the originating server to other servers, via satellite links. Content delivery is similar to but more selective and dynamic than the simple copying or mirroring of a Web site to geographically dispersed servers.
The mysterious characters that sometimes appear on your computer screen, often in text documents and sometimes in code or e-mail messages.
For instance, if you copy the contents of a file from one program to another by highlighting the text with your cursor and then cutting-and-pasting, strange boxes or symbols may appear in the white space. At that point, you have to figure out another way to transfer the information or you have to go through and delete the bad characters, all the while muttering, "Darn gremlins."
Ideas that do not conform to conventional industry methods or practices. It is a phrase used in business to imply the need to think more creatively or to "develop a new angle." For example, "C'mon people, we keep marketing this product in the same way with no real results; we've got to get out-of-the-box on this one."