A simulation of the real thing, it means the same as "almost." You will see this term appear before various Internet terms to indicate a simulation technology that enables you to cross boundaries and experience something without needing it to be physically present, as in virtual sex, virtual theme parks, and virtual communities. The Internet itself can be seen as a virtual world; however, most users prefer the term "online."
The incredibly complex yet tiny modules that store computer memory or provide logic circuitry for microprocessors. Perhaps the best known chips are the Pentium microprocessors from Intel. The PowerPC microprocessor, developed by Apple, Motorola, and IBM, is used in Macintosh personal computers and some workstations. AMD and Cyrix also make popular microprocessor chips.
There are quite a few manufacturers of memory chips. Many special-purpose chips, known as application-specific integrated circuits, are being made today for automobiles, home appliances, telephones, and other devices.
A chip is manufactured from a silicon wafer (or, in some special cases, a sapphire wafer), which is cut to size and then etched with circuits and electronic devices. Chips are made out of semiconducting materials, and they alone can duplicate the function of several transistors and other electronic components. The achievement of chip manufacturing technology has spread the use of computer technology throughout society. A chip is also sometimes called an IC or integrated circuit.
In addition to computers and appliances, microchips are used in RFID, primarily for animal tracking and medical patients. However they are also used for so-called security purposes, for example, some employees are asked to have a microchip implanted in their arm so they can identify themselves by holding their arms in front of a scanner (as opposed to wall humping). Talk about a new meaning for the word chiphead!
A family of Unix version operating systems developed around 1980 by Bill Joy and others at Berkeley (or "Berzerkeley," which was said to be known for BSD and LSD). Incorporating paged virtual memory, TCP/IPnetworking enhancements, and many other features, the BSD versions and the commercial versions derived from them held the technical lead in the Unix world until AT&T's successful standardization efforts after about 1986. BSD is still widely popular, and it is credited with establishing the Internet in colleges and universities since it included TCP/IP. The little dude above is the Berkeley daemon ;-)
FYI: "BSD licenses" represent a family of permissive free software licences, which have few restrictions compared to other free software licenses (such as the GNU GPL or even the default restrictions provided by copyright). Since BSD licenses are closer to the public domain, they have been referred to as "copycenter" as a comparison to standard copyright and copyleft free software.
A play on the words "competition" and "cooperation," it is the result of the joint efforts of two competing companies with overlapping products or technology. Companies like this in the industry find it beneficial to work together with the goal of increasing sales for both companies. One example are the many widgets companies develop for Facebook.
Technically it refers to a family of standards for mobile telecommunications as defined by the International Telecommunication Union which includes GSM, EDGE, UMTS, and CDMA as well as DECT and WiMax. Services include wide-area wireless voice telephone, video calls, and� wireless data. Compared to second-generation services, 3G allows simultaneous use of speech and data services and higher data transfer rates.
Even though it refers to third-generation technology, online slang has morphed the usage into something that is so happening, so right now, as in "Have you seen Dillon's iPhone yet? It is so 3G."
Another name for fluffy TV programs designed to appear as news programming, frequently to promote a product. The term "newszak" has morphed to include flat panel TV screens --carrying news, financial updates and advertising-- in office building elevators and at banks.
Internet crime began with small computer viruses received via e-mail that could shut down a computer. Now, Internet crime is a multi-billion dollar business that includes extortion, identity theft, phishing, and other forms of cyberfraud.
Term of derision often used by young hackers who fancy themselves the legitimate residents of cyberspace and see the older generation of hackers and personal computer developers as parental party crashers. Also: techno-wimps and cyber-yuppies.
Built around the Intel Atom processor, current builds are designed to minimize boot times and power consumption. Intel launched the Moblin.org site in July 2007 and significantly updated the site in April 2008 with the launch of the Intel Atom processor family at the Intel Developer Forum in Shanghai. Film at 11.
The process of using software to automate the business tasks of sales, including order processing, contact management, information sharing, inventory monitoring and control, order tracking, customer management, sales forecast analysis and employee performance evaluation. You get the picture. SFA is used interchangeably with CRM, however, CRM does not always imply automation of sales tasks.
The act of selling a product which is still in development. This type of sales is also referred to as a "good faith sale" because the information the seller is presenting is based solely on a PowerPoint presentation.
The opposite of synchronous is asynchronous, something that is not happening in real time, rather senders ship off their messages for recipients to open at their convenience. Asynchronous communication examples include: email, texting, newsgroups, listservs, blogs, MySpace, Facebook, YouTube. Examples of one-to-one asynchronous communication include: email and
text messaging. Examples of one-to-many asynchronous communication
include: newsgroups, listservs, blogs, MySpace, Facebook, and YouTube.
A term which means "to kill" or "put something out" it can be used in the present or past tense; for example, "We kevorked that project last week." It comes from the last name of Jack Kevorkian, the man known as the death doctor in the United States.
Network attached storage (NAS) is file-level computer data storage connected to a computer network. NAS provides both storage and a file system.
In the basic sense, a NAS unit is a computer connected to a network that only provides file-based data storage services to other devices on the network. Although it may technically be possible to run other software on a NAS unit, it is not designed to be a general purpose server. For a more in-depth technical description, search for this definition below.
FYI: NAS is not to be confused with SAN (Storage Area Network), which provides only block-based storage and leaves file system concerns on the client-side. Despite their differences, SAN and NAS are not mutually exclusive, and may be combined as a SAN-NAS hybrid, offering both file-level protocols (NAS) and block-level protocols (SAN) from the same system. An example of this is Openfiler, a free software product running on Linux.
Content marketing is an umbrella term encompassing all marketing formats that involve the creation or sharing of content for the purpose of engaging current and potential customers. In contrast to traditional marketing methods that aim to increase sales or awareness through interruption techniques, content marketing subscribes to the notion that delivering high-quality, relevant and valuable information to prospects and customers drives profitable consumer action. Content marketing has shown benefits in terms of retaining reader attention and improving brand loyalty better than traditional marketing techniques.
Content marketing products frequently take the form of custom magazines, print or online newsletters, digital content, websites or microsites, white papers, webcasts/webinars, podcasts, video portals or series, in-person roadshows, roundtables, interactive online, email, events. Content marketing is the underlying philosophy driving techniques such
as custom media, custom publishing, database marketing, brand
marketing, branded entertainment and branded content.
The purpose of this information is not to spout the virtues of the marketer’s own products or services, but to inform target customers and prospects about key industry issues, sometimes involving the marketer’s products. The motivation behind content marketing is the belief that educating the customer results in the brand’s recognition as a thought leader and industry expert.
Jargon that refers to the quality of a Web site's link power, as in page rank, number of link votes, etc. - that are obtained from backlinks. This expression was coined by SEO consultant Greg Boser, for example "I need to get some more link juice for my latest site."
A malicious category of software programs that assists criminals in accessing a computer user's online accounts at financial services companies and online retailers, for the purpose of stealing the user's private financial information.
The ability of a file format, program, or hardware device to recognize and work with a particular form of technology. For example, "That version of their Web browser doesn't support frames. It's too old." Technical support is a human resource. You may hear someone say, "If you can't get your new software to load, call the tech support team."
The smallest unit of a picture on a computer screen. When an image's quality is poor, you will see a bunch of square dots, commonly known as "pixelization" resulting in a "pixelated image." Most Web designers and developers agree, a width of 1024 pixels is considered the standard.
An acronym used as an expression by tech support personnel to disguise what they're really saying. For example, "That sounds like an I/O error. Let's try rebooting." It comes from the technical term Input/Output error.
You're in it ;-) "The Web," as it is more commonly called, can be described as a collection of graphical pages on the Internet that can be read and interacted with by computer. You need an Internet connection, a computer, a Web browser, and a few specialized programs (listed below) in order to access and view this online information.
One thing that makes the Web such an exciting and useful medium is that the next document you "visit" could be located on a server down your block or on a server halfway around the world. Note: Not all Internet servers are part of the World Wide Web, but the Web requires the Internet as its transport mechanism.
Created in 1989 at a research institute in Switzerland (CERN), the Web relies upon the HyperText Transfer Protocol (HTTP), an Internet standard that specifies how an application locates and acquires resources stored on another computer on the Internet.
Most Web documents are created using HyperText Markup Language (HTML), an easy-to-learn coding system for the creation and display of WWW documents; these documents incorporate hypermedia (graphics, sounds, animations, and/or video), making the Web the ideal medium for publishing information on the Net. With the development of secured server protocol (HTTPS), the Web has become an important commercial medium whereby consumers can browse online catalogs or purchase merchandise without worrying that their credit card information will be intercepted.
All in all, the Web makes the Internet fun to look at and easy to use, and now, with the convergence of technology and telecommunication, experts are predicting six Webs will emerge (see: evernet).
A marketing ploy that involves placing frequently used keywords, such as "free," "money," or "sex," on a Web site. The intent is to trick a search engine into listing the site whenever those keywords are typed in by a user, even though those words have nothing to do with the site's actual content. Generally, a bait-and-switch is any kind of tactic that attempts to trick someone into action.
To give work to a third-party entity, such as an independent contractor or a freelance agent. This is also known as outsourcing. Companies farm out work when they believe a person or organization has better expertise and can complete a project quicker (or more efficiently) than in-house resources.
At its basic level, it is the construction of a network system that enables users within a single home to simultaneously connect to the Internet over a single account and to share printers and other peripherals. As smart homes become an everyday reality, a wide variety of devices that contain chips will become part of the system (including lighting, appliances, security, and televisions). Systems are based on coaxial cable, existing telephone wires (POTS), and wireless radio frequency (RF).
Similar to an "inbox" on a desk where incoming work gets placed until you are ready to process it, this refers to an area in your e-mail program that holds the incoming e-mail messages you receive. The outbox refers to e-mail messages that are waiting to be sent. You may hear someone say "I've got to clean up my inbox, that thread about the office party has taken it over."
Slang for international correspondence from someone whose command of English is well intentioned, but tenuous at best. For example, "We will most please thank you for investigating our problem in your computer."
A new window that suddenly appears on your computer screen is referred to as a "pop-up window."
You'll see one, for example, when you open a new program, when you switch from program to program (that's multitasking), and when you use a drop-down menu. Likewise, a Web browser may launch a second browser that pops-up in the form of a mini-window on your computer screen. If you don't want it there, just click on the X in the upper-right corner and close it ;-)
The NetLingo Pocket Dictionary on NetLingo.com is an example of something that pops-up.
A radius of approximately 300 feet, a "hotspot" is an area that enables wirelessInternetaccess. For example, if your laptop is properly equipped with a wireless card, you can access the Internet without having to be connected by phone line or cable if you are in a hotspot.
You will see coffee shops such as Starbucks, advertise that they are hotspots. Unlike
piggybacking onto a wireless network, you must usually pay per day or hour to access the net via a hotspot.
A source of funding for early-stage, risk-oriented business endeavors. A venture capital funding arrangement will typically require that the entrepreneur relinquish some level of ownership and control of the business. VC firms offset a high risk of failure for the promise of an even higher return on their investment. The investment is usually in the form of stock or something that can be converted into stock at a later date. As the business matures, an initial public offering (IPO) may take place, or the business may be merged, sold, or additionally funded. These events are intended to enable the company to buy out the venture capitalists. If the business does not mature, major amounts of money could be lost.
Whenever you receive information via a network, it flows downstream. The speed at which you receive (or download) the information is known as the "downstream rate." Whenever you send information over a network, the speed at which you send (or upload) the information is called the "upstream rate."
New and improved, I2 aims to increase the size and strength of the Internet, not to replace it. Internet2 is a TCP/IP-based network, just like the Internet, that uses substantially increased bandwidth between the backbone and local points of presence (POPs). On the Internet, the average POP connection is about 1 Mbps; Internet2 connections (also known as gigaPOPs) are expected to sustain data transfer rates of at least 100 Mbps. While it will play a vital role in uncovering next-generationapplication and protocols that may one day migrate to the commercial Internet, it is not a second-generation commercial Internet. Instead, it's a virtual laboratory where the research community can develop distributed video and audio and other multimedia applications (such as telemedicine procedures) without clogging up the commercial Internet.
I2 was set in motion in 1996, when the NSF awarded grants to thirty-five research institutions across America, helping them connect to the vBNS and thus enabling the NGI initiative to take form. There are hundreds of universities, corporations, and government entities collaborating on this Washington, D.C.-based project, but, for the end-user, its results will not be publicly debuted in the commercial sector beyond making a noticeable difference in how things work, notably in the speed.
Some I2 initiatives include I2-DSI (Distributed Storage Infrastructure), I2-DVN (Digital Video Network), and the Qbone (Quality of Service Backbone Test Bed).
For more information about Internet2, click here or on the "more info" button below!
A play on the phrase "leading edge," this term describes certain kinds of technology (and the people and companies who create it) that are so far advanced, there is no real, practical application for them yet.
One of several major Internet connection points in the United States. NAPs tie all of the ISPs together so that, for example, an AT&T user in Portland, Oregon, can reach the Web site of a Bell South customer in Miami, Florida. Originally, the NSF created and supported four NAPs (in New York, Chicago, San Francisco, and Washington, D.C.). The program was part of the transition from the government-financed Internet to a commercially operated Internet. Since that time, several new NAPs have arrived, including WorldCom's MAE West, in San Jose, California, and ICS Network Systems' "Big East" in Washington, D.C. The NAPs provide major switching facilities that serve the public in general.
For example, the vBNS network, supported by the National Science Foundation (NSF) for research purposes, makes use of the NAPs. Much Internet traffic is handled without involving NAPs, though, using "peering" arrangements and interconnections within geographic regions.
An emerging rule of thumb that suggests that if you get a group of 100 people online, then one will create content, ten will interact with it (commenting or offering improvements) and the other 89 will just view it (also known as lurking). Earlier metrics garnered from online community sites suggested that about 80% of content was produced by 20% of the users, but the growing data due to social networking sites and blogs creates a different picture. The lesson? A Web site that demands too much interaction and content generation from users will see nine out of ten people just pass by.
One who raises venture capital with the goal of earning significant financial returns for the participating institutional investors. Venture capitalists also specialize in assembling seasoned management teams and are often considered experts in the particular industries they come from. For example, in addition to being a partner in New Enterprise Associates, Stewart Alsop is a contributing editor to InfoWorld (having formerly served as editor-in-chief).
To copy and post another person's Twittercontent.� When someone retweets you, it is considered the highest compliment you can get on Twitter because they are choosing to share your post with their own followers or contacts.