Perpetual BBS discussions that never die, the arguments never change, and no one's opinions ever budge one iota. "Holy wars" are
fought over abortion, gun control, Mac versus IBM, Windows versus DOS, and how much nudity to allow in the image areas of online services.
A direct marketing strategy that allows marketers to control the generation of sales leads. It involves sending out several promotional pieces over a period of time, so that the leads arrive at a rate the sales force can accommodate without the leads getting cold.
A form of e-commerce by companies that sell news, documents, subscriptions, or any other content that can be delivered digitally over the Web. Under the ultimate "pay as you go" model, a d-commerce company acts as an electronic middleman: Users establish an account with a d-commerce company to purchase content from a variety publishers, which is easier because they give out their credit card number once instead of to a multitude of Web publishers. The d-commerce company, in turn, handles the billing, collection, refunds, and other payment processes for the publisher. D-commerce is considered a form of e-commerce because money is exchanged for a product or service that exists "electronically" (in this case, "digitally"). For more information, read the column "Digital Commerce," by Denise Caruso, in The New York Times.
A technique used to cache information on a Web server. It acts as an intermediary between a Web client and a Web server.
Basically, a proxy server holds the most commonly accessed and recently used content from the World Wide Web in order to provide quicker downloads for users and to increase server security. It is common for an ISP to use a proxy server, especially if it has a slow link to the Internet. Proxy servers are also constructs that allow direct Internet access from behind a firewall. They open a socket on the server and allow communication via that socket to the Internet.
For example, if your computer is inside a protected network and you want to browse the Web using Netscape, you will need to set up a proxy server on a firewall. The proxy server would be configured to allow requests from your computer, trying for port 80, to connect to port 1080 on the server; then all of your requests would be redirected to the proper place.
Slang usage of this term implies a catalyst. For example, "In our company, the Internet is a proxy for change, and people are looking to me to act as the change agent."
The business truism, also known as the "80-20 rule," in which 80% of your business comes from 20% of your customers. Vilfredo Pareto, the 19th-century economist who coined the term, would most likely have to revise it for the 21st century since the harsh reality today is that the split tends to be closer to 90%-10% or even 95%-5%.
Simply put, an IPO is a company's first offering of stock to the public. If you want to "take your company public" or "go public," you must file a registration statement with the SEC (Securities and Exchange Commission) before you can sell your stock publicly. Any information contained in the registration statements becomes public, immediately upon filing. Many dot-coms held IPOs in the late 1990's, resulting in quite a few IPOoafs. IPOs are such a big deal because anyone holding stock at the offering price when a company goes public is in line for "free money"-most new issues rise in value, at least temporarily.
Click on the "more button" below for more info on IPOs.
Thunderbird is an e-mail program created by the folks at Mozilla who claim it makes sending e-mail safer, faster, and easier than ever before.
Some of the benefits of Thunderbird include:
It removes spam and helps keep your Inbox clean.
There is a new three-column view to access your e-mail so you can view your e-mail the way you want it.
There is built-in spell checking.
It is safe and secure and provides enterprise and government grade security features such as S/MIME, digital signing, message encryption, support for certificates and security devices.
Unlike many other e-mail products, it doesn't allow scripts to run by default. This results in a more secure product than other mail clients on the market and helps stop the spreading of worms and viruses on the Web.
It has unlimited functionality through extensions. Thunderbird is packed with great features like IMAP/POP support, support for HTML mail, labels, quick search, a smart address book, return receipts, advanced message filtering, LDAP address completion, import tools, powerful search, and the ability to manage multiple e-mail and newsgroup accounts.
You may add additional features as you need them through extensions. Extensions are powerful tools to help you build a mail client that meets your specific needs. Take a look at the various extensions available.
You can personalize it with themes - just about any part of the interface can be changed with themes.
It is cross-platform! Windows, Linux or Macintosh? Regardless of your choice of operating system, Thunderbird is available. It currently runs on Windows 95, 98, Me, 2000 and XP, as well as Linux, MacOS X, OS/2 and Solaris.
A buzzword for librarians, website programmers, and other usability experts whose job is to balance the needs of website sponsors, the users and the designers so that the information is presented in a manner that makes all concerned pleased.
A method for storing text, data, or images in fewer bits, it makes data smaller so less disk or file space is needed to represent the same information. Consequently, the information may be transmitted in less time. Compression takes place via one of several compression standards, including JPG, MPEG, GIF, TIF, and ZIP.
A port that enables devices to exchange data without using cables. Usually, you'd attach a dongle to a serial port, but with infrared ports, you can place the devices across from each other (so the infrared ports are facing) and "beam" your info instantaneously. IrDA stands for "Infrared Data Association," a group of device manufacturers that developed the standard for transmitting data via infrared light waves. IrDA enabled products include: adapters, dongles, notebooks, PDAs, cell phones, handhelds, pagers, scanners, digital cameras, printers, fax machines, bar code scanners, set top boxes (STB), toys, wrist watches, and more.
A service providing model in which the provider offers computing resources and infrastructure management that is available as needed. Service providers such as Hewlett-Packard and IBM charge for specific usage versus a flat rate which can help minimize associated costs.
An input device used on a Web page, usually in a form. It provides the user with a handy way to scroll through a list of selections and to choose either one or multiple values. As an HTML and Web designtool, select boxes are most useful when you don't need to show all the selections at once, such as when users select the state they live in.
In client/server applications, "push" is to send data to a client without the client requesting it. The World Wide Web is based on a "pull" technology where the client browser must request a Web page before it is sent.
Broadcast media are traditionally "push technologies" because they send information out regardless of whether anyone is tuned in. Increasingly, companies are using the Internet to deliver information push-style. In PR (public relations), "push PR" refers to basic PR which is
essentially an outreach effort. It involves creating a story for the
client to market and then packaging it as a press release (or a pitch
or a call).
Online examples of push technologies are e-mail, a portal (on a handhelddevice that supports a microbrowser), paging networks (again Blackberry because it serves more than one function), file transfer, and RSS. The most widely used push technology is e-mail, it is a push technology because you receive mail whether you ask for it or not, that is, the sender pushes the message to the receiver.
In programming, "push" is to place a data item onto a stack. In this case, the opposite of push is "pop" which means to remove an object from a stack.
A portal that caters to consumers within a particular industry (sometimes called a "vertical industry"). Vertical portals, also called "vortals," use Internet technology to offer the same kind of personalization tools that portals do. Another kind of vortal caters solely to other businesses rather than to an industry's consumers. The B2C portal gave the B2B industry a model to work from, and now, most business-to-business sites bill themselves as portals.
We like to define business-to-business sites as vertical portals because they deliver content and services focused on their particular niche. The term "portal" is getting muddied because although many sites call themselves portals they are, in fact, simply Web sites that use cookie and/or personalization technology (see: personalize).
The two essential components of a vertical portal are that it uses this kind of technology and caters to a specific industry. The two essential components of a regular portal are that it uses this kind of technology and provides a variety of news, media, and services.
A phrase that describes the stress of working on Internet time in the industry, it occurs for several reasons. For example, there's tremendous pressure from corporate heads and fellow colleagues to work 12-16 hours days so that if you don't, you aren't considered a team player. There's also the frustration that accompanies working at a start-up because the business model is constantly changing so that you have to either "wear a lot of hats" or be able to change direction at a moment's notice. Then, when the project you spent the last six months working on is rendered useless or obsolete and you have to start all over again, the feeling is very empty and unsettling. In addition to increasingly strange office politics (due to the pressure put on by the VC firms and the rush of people wanting to get promoted as quickly as possible), mental anxiety, insomnia and RSI often result which adversely affects the overall performance of people and ultimately contributes to the dot-com deadpool. This "syndrome" is also known as a "drink the KoolAid" environment (with reference to Jim Jones' cult).
A method for dividing each digital-cellular telephone channel into three time-slots so more data can be transferred simultaneously. It is a second-generation wireless technology.
Be sure to also read through these definitions: CDMA, GPRS
A peripheral device that digitizes artwork or photographs and stores the images as files that you can use with text in a word processing or page layout program. A scanner is how you get a hard copyimage of something onto a computer screen.
A spoof Web site is one that mimics a popular company's Web site to lure you into disclosing confidential information. To make spoof sites seem legitimate, identity thieves use the names, logos, graphics and even code of the real company's site. They can even fake the URL that appears in the address field at the top of your browser window and the padlock that appears in the lower right corner. The links in the spoof e-mails almost always take you to a spoof web site.
A Unix sound file format. On the Net, you may come across the option to hear a sound clip. The file that is downloaded to your computer when "clicked on" might be in the AU format (if the sound file was originally captured on a Unix system or converted from another platform). Your helper applications or browserplugins need to be configured to know what to do with this type of file.
A derogatory term used to describe a lower form of life found on talker systems and MUD. The spod has few friends IRL and uses talkers instead, finding communication easier and preferable over the Net. He or she has all the negative traits of the computer geek without having any interest in computers per se. Lacking knowledge of, or interest in, how networks work and considering access a right (rather than a privilege), spods are a major irritant to sysadmins. They clog up lines in order to reach new MUDs, follow passed-on instructions on how to sneak in, and then complain about not being allowed to use busy routes.
A true spod will start any conversation with "Are you MorF?" and follow it up with "Got any good numbers or IDs or passwords?" He or she will not talk to someone physically present in the same room until they log onto the same machine that he is using and enter talk mode.
Digitalwireless technology that simultaneously uses multiple channels, over the full bandwidth of a wideband channel, by assigning each user a code. It is known as a spread-spectrum air interface technology used in some digital cellular, personal communications services, and wireless networks. It's a 2G technology used by Alltel, Sprint, and Verizon; the next-generation CDMA networks are called "CDMA2000" (the first phase is 1xRT). If you see "W-CDMA" refers to wideband.
An overly elaborate sig quote. For example, if a user has "tagged on" twenty lines or more after the body of an e-mail message below their name (and if there is a typo, or more than one quote, or some kind of bogusASCII art), it's known as a dag-tag.
It refers to "a dag" (which, as any good Aussie will tell you, is what gets stuck to the anus of a sheep after it's dropped its stool (Americans call those dingleberries)! So then, a dag-tag is the equivalent within an email message - a piece of sh*t that got stuck there but shouldn't have ;-)
A small, handhelddevice that displays messages in a text-only format (as in phone numbers, e-mail, or SMS) on a small screen via a wireless network. It only accepts incoming messages (as opposed to a cell phone which can also make outgoing calls).
For the largest list of Internet acronyms and text message jargon, click on "more info" below!
"Shoulder surfing" is a term that refers to someone standing over your shoulder to obtain private and sensitive information as you complete a form using your personal information, enter in your PIN or password, or even when dialing a telephone number. Shoulder surfing can also be accomplished from a very far distance by using binoculars. To prevent this from happening you should always shield your paperwork and keyboard from the view of others.
To click twice. In order to highlight a word in a word processing program, for example, you must place your cursor on top of the word and double-click quickly. Fortunately, when you browse the Web and click on a link, you only have to click once (likewise, some operating systems can be configured this way as well). When you're new at this, you may not know whether to click once or twice; usually, when you're working inside a computer application, you must double-click, but when you're on the Web or when you "hit OK" or submit information on a form, you single-click. A tech support person may say, for example, "Do you see the icon on your desktop? OK, double-click on that."
A small piece of information. For example, NetLingo.com licenses a small search box to other Web sites so that content providers can expand their content offerings by including several snippets of other people's information.
An electronic marketplace in which goods and services are traded. These exchanges are global in nature, operate 24/7, and connect large communities of buyers and sellers, primarily within the B2B sector. Electronic exchanges range from auctions of all types to VPNs. For example, the Automotive Network Exchange (ANX) is expected to link the entire North American auto supply chain. While "B2B" and "Web marketplace" broadly refer to any transaction between businesses over the Internet, usually one-to-many, "electronic exchange" is a more precise term, connoting many-to-many transactions. An electronic communications network (such as an electronic stock and bond exchange) is also considered a Web marketplace. The actual point where the buyers and sellers come together is known as "the vortex" or "the butterfly hub."
A coffee cup "to go," for cappuccino cowboys (and cowgirls) to take on the road, presumably as they commute to work. A roadie usually comes with a spill-proof top and a recycled cardboard "jacket" (also known as a "collar") that keeps your fingers from getting hot.
An e-mail in which recipients can buy goods and services directly from the e-mail message without being redirected to the retailer's Web site.
Marketers have consistently shown that transactional e-mail leads to significantly higher conversion rates, meaning more people convert from shoppers to buyers when they receive a transactional e-mail versus a regular e-mail. It's understandable considering that within the body of the message of a transactional e-mail, the recipient can view merchandise, select items, and submit an order. Just like on an e-commerce site, when the order form is completed, the customer clicks the "submit" button (and can then resume reading their other e-mail messages).
Here's a great example: Zagat's, a well-known distributor of restaurant guides, tried transactional e-mail sales for the 2000 holiday season, allowing customers to buy restaurant guides directly from the body of the e-mail message, rather than just including a link to their Web site. The campaign attained conversion rates five times as high as those of regular e-mail marketing. They believed this high conversion was due in large part to impulse purchases because the transaction could be completed before the customer grew weary of the procedures involved.
SaaS (Software as a Service) is a model of software distribution in which applications are hosted by a service provider or vendor and
made available to customers over a network, such as the Internet. Known as "service on demand"� SaaS software vendors typically host the application on their own Web servers or download the application to the consumer device (disabling it after the on-demand contract expires). Generally referred to on an enterprise level, the on-demand function may be handled internally to share licenses within a firm or by a third-party application service provider (ASP) sharing licenses between firms. See: cloud computing
A telecommunications line that provides a fast, permanent connection to the Internet. DSL uses the copper wiring found in almost every home and office. Special hardware attached at both ends of the line allows data to transmit at a far greater speed than standard telephone wiring can. It also provides a constant connection to the Internet, 24/7, so there is no need to dial-in to an ISP each time you want to get online (see: always-on). A DSL line is also convenient because you only need one line to carry both voice and data signals (in other words, you don't have to get a second phone line with DSL). DSL is similar to ISDN in that they both operate over existing copper telephone lines (POTS) and require short runs to a central office. (The reason why DSL is not yet available in many areas is because of the distance from a central office.) DSL provides higher speeds than ISDN, but with DSL, the connection speeds vary. Many people prefer the fixed speed of an ISDN (or a T1, for that matter). Connection speeds for DSL typically range from 1.544 Mbps to 512 Kbpsdownstream and around 128 Kbps upstream. There are several types of DSL, and xDSL refers to the family of digital subscriber line technologies:
* ADSL (Asymmetric DSL, where you can download faster than upload)
* CDSL (Consumer DSL)
* DSLAM (DSL Access Multiplexer)
* G.Lite (slightly slower than ADSL but much cheaper)