Recorded or synthesized words that have been spliced together to create an answer or directive as part of an interactive dialogue between a computer and a person. For example, concatenated speech will direct you through the voice mail when you call certain corporations or government agencies.
Slang for coming out of online "lurking mode", usually motivated by an irresistible need to flame about something. For example, "I just had to delurk and add my two cents to that conversation about global warming."
In computer-speak, this term is used interchangeably with CPU. It is frequently described as the brain of a computer because the microprocessor controls the central processing of data in personal computers (PCs), servers, workstations, and other devices.
More or less a self-explanatory concept implemented by businesses for improving profits. This tactic begins with evaluating and assessing a given business process, then using the discovered "facts" to restructure the process to maximize profits.
First, there was P2P (Peer-to-Peer), the principle of which was embodied by Napster and instant messaging. Now the concept has expanded to include things such as personal digital assistants (PDAs) and smart phones. It's called PP2P, which means "Personal Peer-to-Peer."
An open source Web browser designed for standards compliance, performance, and portability. It was the original version of the Netscape browser and now Firefox is Mozilla's next-generation Web browser. Some people claim that the name is a cross of Mosaic and Godzilla (as in, "the Mosaic killer"), since Mosaic was the number one Web browser at the time Netscape began developing its product.
Mozilla is still used by many Web developers, and it appears in server log files that identify users' browsers. Artist Dave Titus created the Mozilla mascot (a smiling dragon). It was used in Netscape's early years but has mostly been replaced by their nautical "N" icon (however, Mozilla the dragon still appears from time to time).
Cyberfraud refers to any type of deliberate deception for unfair or unlawful gain that occurs online. The most common form is online credit card theft. Other common forms of monetary cyberfraud include nondelivery of paid products purchased through online auctions and nondelivery of merchandise or software bought online.
Here's an example a 20-year-old Facebook user posted: "I eyed this girl on campus for months before I finally got the nerve to talk to her. I created an excuse to ask her a question and then started chatting her up. I must have given off the vibe that I was interested because right away, she dropped the bomb that she had a boyfriend. Bummed but not discouraged, I got my computer-savvy friend to hack into her boyfriend's Facebook account and change his relationship status to 'single.' The girl must have freaked out because the next thing I heard, they'd gotten into a huge fight and broken things off. A few days later, I asked her about her boyfriend, totally playing it off like I had no idea they were through. When she told me what had happened, I offered to take her out for coffee to get her mind off the breakup. My plan worked, because after our little date, she came back to my dorm room and we hooked up." The moral: DBEYR.
Another name for a page on a Web site to which people are referred via links from other Web sites, especially from ad banners.
For example, when a company is in the middle of an online ad campaign, it may steer users to more than one landing page in order to test the effectiveness of each ad. Usually, a company will design one landing page per banner so the follow-up content matches the sell on the particular banner ad.
According to one expert, the Seven Deadly Sins of Landing Page Usability are: 1. Too much introductory text 2. Not showing what your site offers to users 3. Using gratuitous animation and graphics 4. Not showing users where they have been on your site 5. Not telling users what the site or company does 6. Using a heading to label a search area 7. Making a homepage link on the homepage For a full copy of this article, view the PDF archive here.
The problems, errors, glitches, or anomalies identified during the pre-release phase of a commercial computer product. Beta bugs usually pertain to software (such as an operating system or Web serverapplication), but this term is also used to refer to hardware.
A name for the many national franchise stores in American strip malls and on highway exits that, for the most part, all look alike and carry similar products. They are held largely responsible for the demise of the sole proprietorship.
An expression that refers to something which is still in preparation and not yet ready for development. It specifically refers to the set of stages and processes from the invention or
design of a product to its ultimate use, production, or
For example, when Vinton Cerf joined Google as Chief Internet Evangelist he said "I haven't spent enough time at Google to know if any of the ideas I have are old hat or already in the pipeline."
A phrase sometimes seen in the bottom-right corner on certain versions of the IEbrowser, when it is taking you to the next Web page. It is there to imply that you are not yet at the Web site or that it is still downloading components of the Web page (usually graphics).
A business person who makes a living by making money out of information. Information traffickers consider themselves infopreneurs because many of them utilize the power of the World Wide Web to create web sites and blogs as their storefront.
However unlike infopreneurs, who generally repackage content in a novel way to meet the needs of their audience, information traffickers also repackage information but are often associated with "get rich quick schemes" or they are "out to make a quick buck."
The information trafficker will attempt to attract traffic to his/her site by manipulating the site to appear higher on organic search results. This is done by creating a site that is robust in content, and configuring meta tagkeywords and descriptions. In order to quickly create such sites, "info traffickers" will mash together information by incorporating RSS feeds from more popular sites, and then money from Google Adsense ads, affiliate links, referrals and leads, and/or selling e-books that are related to the search parameters and keywords. Essentially, these traffickers "piggy-back" on already established information (indeed there are many such splogs that copy articles verbatim from Wikipedia).
In a general sense, "hosting" refers to "Web site hosting" which is the business of providing the equipment and services required to display Web sites. The business of hosting also involves maintaining files and providing fast Internet connections. If you run a Web site or do business on the Web, you have a host and you know the importance of having a good, reliable host. Hosting is very affordable nowadays; the most important factor continues to be good customer service, make sure they have it!
There are several kinds of hosting packages available, including:
One who is immersed in the new culture of the World Wide Web, which emphasizes the freedom of information and of access to that information, technology and its effect on the future of our culture, and individual freedom and the freedom of expression.
A measurement of the size of a Web site's audience. Web ratings are similar to TV ratings in determining what content is the most popular. They're used by companies when buying online ads, by analysts when valuing Internet stocks, and by venture capitalists when making funding decisions.
A play on the terms "blue-collar worker" and "white-collar worker" this is a designation for employees who survive a downsizing.
Analysts say mass layoffs, where companies dismiss more than 50 workers,
are not about weeding out the bad employees, but about keeping the ones
who can handle extra workloads. Any employee who can easily pick up the
slack in a downsized organization greatly improves his or her chances of being
retained during a reorganization. Any employee can become a "gold-collar
worker" by taking advantage of training and continuing education
opportunities. While human resource professionals are looking through the pool of readily
available candidates with pink slips in hand, they are also courting the
overburdened multitaskers who remain.
The standard for ensuring privacy and protection for conducting credit card transactions over the Internet. SET utilizes digital signatures so that the transaction can be completed securely and confidentially by the customer, the merchant, and the bank. The customer does not have to send a credit card number over the Net because that information is already verified through the digital signature. Even though it's been endorsed by Visa, Mastercard, Microsoft, and Netscape, SET requires complex software built into browsers and has therefore not been widely adopted in the online marketplace.
In the online world, "transparency" refers to the act of being visible and openly communicative on the Internet. It is a metaphorical extension of the word "transparent" which implies an object is
one that can be seen through.
Transparency, as used in a social networking context, implies openness, communication, and accountability.� Transparent procedures in business include open meetings, financial disclosure statements, freedom of information legislation, budgetary review, and audits.
Here's an example of its usage as seen in The Week by William Falk, "Have you ever sent a snarky e-mail you wouldn’t want published? Made a cutting comment, entre nous, about a colleague or boss or friend? Said or written or texted something that could, if known to the world, get you fired or shunned in polite company? For shame! You are not being transparent. Transparency, you see, has become the ultimate virtue of this digital age; only Luddites, still mired in the 20th century, cling to outmoded notions of privacy. Virtually every week now, some CEO, journalist, or minor celebrity is fired or humiliated because of an e-mail he or she assumed would be seen by one other person, or an off-hand remark that got tweeted. But as the digital media bites the hand that types into it, The New York Observer reports this week, a backlash against total transparency has begun.
When every person armed with a tiny keyboard is a reporter, the digerati are discovering, casual gatherings of friends turn into a minefield. Any bit of candor, any crude joke, any drunken cell phone photo from the bar may be tweeted or blogged or Facebooked to the world, and thus become part of your indelible Web profile. Even in casual conversations, hip young Manhattanites are acting like Supreme Court nominees, “watching what they say with unprecedented vigilance.’’ It makes me grateful to be a Luddite, with no Twitter feed documenting the thoughtless remarks that sometimes come out of my mouth, and no Facebook photo of that night in South Beach when I put an ice bucket over my head. So which will it be: total transparency, or rebellion? Rebel, I say! But please, don’t quote me."
A portable camera that records images in a machine-readable format. These cameras eliminate the expensive and time-consuming methods normally involved in creating computer-readable images, including film processing and image scanning.
It's "survival of the fittest" in the business world, and thousands of dot-com companies have failed in dot-com shakeouts. Considered a necessary part of any ecosystem, each shakeout rids the industry of bad business models, ineffective management, and overvaluation. So far, there have been three shakeouts: the first occurred in Silicon Alley during mid 1996; the second, the Nasdaq crash on April 14, 2000, was the worst ever and shook Silicon Valley to its core; the third shakeout lasted for about 4 years and was known as the "Internet backlash." Even though VC money still flowed regularly into the Internet industry, it took the Google IPO in 2004, and later Web 2.0, to get popular opinion thinking about investing in risky high-tech start-ups again.
Click on "more info" below to see The Top 10 Dot-com Flops.
Increasingly, it's how companies refer to their employees. Some Human Resource execs are even calling themselves Human Capital Managers and there's a magazine for them by that name. In some corners, human capital is also referred to as "blood supply" or "living assets."
Wireless communication technology that uses GSMspectrum, which enables data speeds of up to 384 Kbps. It is the name for the high-speedcell phonenetwork at T-Mobile used to transmit not only voice and data, but also music, video clips and Web sites.
The Internet represents an extraordinary opportunity to converse with people all over the world; online communities provide a framework in which to exchange ideas and information, build relationships, and interact. People who often frequent a specific community are referred to as "members," and loyal members consider these communities part of their "corner of the Net" (meaning they stop in every time they get online to check on things). In the industry, online communities are considered one of the three big C's: content, commerce, and community. Businesses, especially dot-coms, try to create online communities of users and subscribers to attract more customers, build loyalty with their audience, and grow a database of contacts for marketing. Ultimately, the business model is either to sell these lists or to get a variety of sponsors to advertise to the community's special needs.
Alternative computerized trading systems that automatically route, match, and execute orders between buyers and sellers of stocks. Currently, they handle approximately 38 percent to 50 percent of Nasdaq trading.
A development process based on the notion of taking something apart to see how it works and then putting it back together again. Reverse engineering often means decoding or analyzing a device or program with the intent of using its technology to create another product. Most software user agreements now prohibit unauthorized reverse engineering, making it a violation of intellectual property rights.
One of the most blatant examples of this is the IBM-compatible PC (see: IBM-PC). Somewhere along the line, someone reverse-engineered the chips in the first IBM-PC and created a working counterpart without infringing upon IBM's copyrights.
This term is also used as slang for an interrogation, as in, "She reverse-engineered him all day until he finally fessed up about the office party." Another example is "We have to reverse engineer their homepage to figure out what people want, not what the client thinks they should want."
Originally used in meteorology, it is an attempt to re-create a historical weather pattern with a computer simulation. The initial conditions of the actual storm are entered into the computer, and the results are then compared with what actually happened.
Slang for the opposite of forecasting, this term has entered the business world to mean "reporting" or "a report." For example, "Johnson, show me an aftcast of our sales on cyber Monday, I think Shirley's predictions were a bit short."
A set of mathematical rules that search engines use to rank the search results once a user has entered in a keyword (or keywords) when performing an online search. In other words, it is a method of ranking the Web site listings contained within its index.
To protect themselves from competitors (and to avoid telling Webmasters and SEO specialists how to take advantage of their technology so they do not spam the index) search engine companies generally do not divulge how their own algorithms work. As a result of this secrecy, enormous amounts of information have been written online in an attempt to figure out, for instance, Google's algorithms.
The ability of one application to use data produced by another application. For example, many programs are able to import graphics in a variety of formats. The import feature is under the File menu in most programs; it will show you a list of programs that are recognized for importing data. In other applications, such as a database program, an import window may appear giving you the option to select the location of the document to be imported and to select from a list of file formats.
Slang for "the system" which includes the government and the judicial system, it originally comes from politics where a "big tent" party was set up to attract people with diverse viewpoints. Now it refers to the overall "catch-all system" for example, "Did you see the blogosphere attack the big tent last night? The greenwash analysts are all over it."
A Uniform Resource Name (URN) functions like a person's name, while a Uniform Resource Locator (URL) resembles that person's street address. In other words, the URN defines an item's identity, while the URL provides a method for finding it.
Take the ISBN system for uniquely identifying books as an example of the use of typical URNs. The ISBN 0970639678 (urn:isbn:0-9706396-7-8) cites unambiguously a specific edition of NetLingo The Internet Dictionary. In order to gain access to this object and read the book, one would need its location: a URL address. A typical URL for this book on a Unixoperating system might look like the file path file:///home/username/NetLingoBook.pdf, identifying the electronic book saved in a file on a local hard disk. Therefore URNs and URLs have complementary purposes.