A blanket term for the transmission of videodata by TPC to homes and businesses. VDT is sometimes used in a competitive context with VOD (Video-On-Demand), but that is erroneous since the latter is the cable companies' term for transmitting interactive video services.
A part of a character string that, when used in text searches, makes finding a match much easier. When you are doing an online search on a search engine, you can place an asterisk (*) at the end of a keyword to broaden your search and retrieve more information. Here's how it works: If you type "market*" you'll find words that contain the root "market" as well as words such as "marketing," "marketplace," "marketer," or "markets." A wild card is also a keyboard symbol (such as an asterisk or a question mark) that in some programming languages can take the place of any other character.
Originally this was a term for the unpredictable part of a network that data travels through on its way to its final destination. In a packet-switched network, the physical path on which the data packet travels can vary from one packet to the next. In a circuit-switched network, the specific circuit can vary from one connection to the next.
It later morphed into "the cloud" - which refers to a style of computing in which dynamic, scalable and virtual resources are provided over the Internet. Known as cloud computing, it refers to services that provide common business applications online, which are accessed from a Web browser, while the software and data are stored on the servers.
Infrastructure as a Service (IaaS) in its most basic sense it is the delivery of computer infrastructure as a service instead of a product; kind of like "renting your computer equipment." Similar to SaaS and PaaS, IaaS is a provision model in which a
vendor outsources the equipment used to support operations (including data storage and hardware equipment such as servers and networking components) and the client pays on a per-use
vendor or service provider owns the equipment and is responsible for housing,
running and maintaining it, while the client pays for it and uses it to support business operations.
The original term was Hardware as a Service (HaaS), first coined by the
economist Nicholas Carr in March 2006, it is now more commonly known as Infrastructure as a Service (IaaS). The service is billed on a utility computing basis and so the cost depends on the amount
of resources consumed and the level of activity. It is an evolution of Web hosting and VPNs.
Unlike normal e-mail, which is accessed through a mail program configured for use on a specific computer, Webmail allows you to access your account on a Web page, using your browser. This means you can read, send, and organize your e-mail on any computer, anywhere in the world, with an Internet connection. Some Webmail accounts can also be configured to view your "regular" e-mail on the Web as well, which is a perfect solution for road warriors. A popular Webmail service is Hotmail, and privacy is protected by the use of a unique username and password. The main disadvantage of Webmail is that you have to view your e-mail while connected to the Net (this means you have to pay phone charges and it makes processing e-mail much slower).
Slang for compliments or statements of thanks, implying esteem for a work colleague. For example, "Mad props to Chris for being such a positive, promotional force in the planning of the party." It can also be a synonym for "friends," as in, "I've got my props with me, and they'll back me up if I need them." Props can also be proper respect, as in, "The class gave me props during my presentation."
A commonly used encryption system developed by Philip Zimmermann. It allows users to send e-mail messages to anyone in the world in complete privacy. With PGP, you can send authentication with your messages so that the recipient can verify that the message really came from you. You can also encrypt sensitive files on your computer so that they remain private even if your computer and disks are stolen.
For a more in-depth look at how PGP works, click on the "more info" button below!
There are many uses for this term, with subtle differences in meaning. The most technically correct usage is for a single HTML file that contains text and images, is part of a Web site, and has an individual file name assigned to it. When viewed by a Web browser, this file could actually be several screen dimensions long (appearing as more than "a page"). Many times, on the Web, a user must "scroll down the page" in order to view the rest of the contents on the screen. Even if "the page" prints out at ten pages long, that one HTML file is considered a single "Web page."
Large Web sites are said to have hundreds of pages of information. In this usage, "page" refers to the actual hundreds of separate documents varying in length, each with a different topic or subject. Web page length was once judged by how many lines of the content happened to fit on a printed 8 1/2" x 11" page, but this usage is out-of-date.
Digital information is not bound to the same restrictions as printed information. (There was once a time when graphic designers who had crossed over from the print industry and became Web designers would estimate a fee for designing an online project based on how many printed pages it came out to. This thinking is obsolete as Web designers realize the value is not in the amount of content but rather in how it is organized.) The term "Web page" also refers to an entire Web site.
You may hear someone ask, "Have you got a Web page?" This usage pertains to the collection of "pages" that are "housed" under one domain name. It is also referred to as a homepage.
An example of 3-way linking is when a person owns two Web sites, and uses one of the Web sites to offer link exchanges, in an attempt to build up the popularity of the other. In doing so, he or she adds a link to your site on the link exchange Web site, and asks in return that you link to the main site being promoted.
The higher a search engine can return your Web site when a user types in a keyword, the more traffic your Web site will receive. These optimized results are important on an ever-growing World Wide Web, and that's why Google is so revered: their algorithms produce the best results. Webmasters attempt to do all they can to accommodate the search bots, so as to increase their search results and their page rank. However, Google regularly penalizes Web sites for too many paid links and lowers page ranks. This is why 3-way linking and dedicated pages are becoming more important.
Many search algorithms are able to detect link trading as an artificial means of boosting the popularity of a Web site, thereby discounting the value of these links. By doing a 3-way link between Web sites hosted on different servers, a Webmaster can build link popularity without the search engine detecting the trade as easily.
The image illustrates the example: Site A represents you, the Webmaster of your own site. Sites B & C are owned by us. Site A links to Site B and Site C links to Site A. (If search Google for "3-way link" below, it will bring back several current Webmaster forum links and postings.)
Someone who commutes from a suburban neighborhood to the downtown area. It usually refers to working in the inner-city area and being up scaled for dot-com startup companies. This term is heard frequently in Seattle, Portland and San Francisco.
A three-way interaction in a client/server environment, in which the user interface is stored in the client, the bulk of the business application logic is stored in one or more servers, and the data is stored in a database server.
Online jargon that refers to the community of MySpace as opposed to Facebook.
Coined by social networking scholar Danah Boyd in a book chapter as reported by MIT's Technology
Review, she theorizes that people fled MySpace first because they got scared of it, eventually
coming to see it as a sort of "digital ghetto" filled with creepy spammers, weirdo
goth kids and people of color (as opposed to the predominantly white audience on Facebook).
An individual or group within a company that makes sure software and hardware development follows established corporate guidelines. The "architecture police" also rein in excessively creative development efforts in conservative organizations.
A concert transmitted via cell phone. A "cellcert" happens
when a person dials a friend and hold up his or her cell phone so the friend
can enjoy the show.
For example, let's say that Natasha is at a Madonna concert. By prearrangement, as the concert begins, she makes a cell phone call to her friend Tina. As Madonna walks out on stage, Natasha begins narrating what Madonna is wearing, what she is saying, how the crowd is reacting, and so on. Meanwhile Tina is busily typing a version of the narration onto an online Madonna fan site, so a virtual audience around the world can experience the next best thing to being there.
The digital equivalent of the "do not call" registry that prohibits telemarketing phone calls, the "do not track" initiative is a way for users to avoid being monitored online.
Spearheaded by Firefox, who is exploring ways to create a do-not-track mechanism, one approach would be to automatically opt-out of online tracking. For example, when you open a Web browser, a "do not track me" option would be available and as you surf, your browser would alert ad companies and other fingerprinters that you don't want to be tracked.
Historical perspective: In late 2010, the website "AboutAds.info" allows people to opt out of 58 tracking companies with a single click, and "PrivacyChoice.org" has compiled a list of 274 companies that use tracking technology.
As part of a university project simulating an identity theft ring, elite teams of hackers (good guys) harvested millions of names, birth dates and social security numbers in less than an hour using Google. It turns out that the powerful search engine can ferret out all kids of sensitive information never meant to be made public.
The right keywords and search terms can even find information deleted from corporate or government Web
sites but temporarily cached in Google's massive warehouse of data. The cybercops were quick to point out that the problem isn't with Google, but rather with the
corporatations. "If they're performing proper security, then their intranet shouldn't be vulnerable."
Slang for an incubator that tries to create a great company virtually overnight but fails miserably. Most often, it fails for all the most common causes, normal reasons that the incubator seemingly overlooked or thought would not be relevant.
Developed by Sun Microsystems, it is a programming language specifically designed for writing programs that can be safely downloaded through the Internet without fear of viruses or other harm to computers or files. Using small Java programs called applets, Web pages can include functions such as animations, calculators, and other fancy tricks. Java is a simple, robust, object-oriented, platform-independent, multi-threaded, dynamic, general-purpose programming environment. It is best used for creating applets and applications for intranets, the Internet, and any other complex, distributed network. For more information on Java, visit this definition on NetLingo.com.
A modem that plugs into a cable network to provide Internet access, typically for homes or small businesses. It receives Internet data over the same type of cable that cable television uses (coaxial cable or fiber-optic cable). Cable modems provide more bandwidth (up to 10 Mbps) than regular modems (which send signals over regular telephone lines, see: POTS). Data-intensive operations, like video, are easily delivered. Cable modems have maximum data rates that are six times those of a T1dedicated line, but since cable connections are shared, the actual speed is comparable to that of a phone line using DSL.
A condition resulting in tweeting frequent, short bursts of the most minute daily activities, it is feeling compelled to tweet constantly about every meaningless thing you do. It also refers to the collection of tweets from a group of people about the same event, resulting in highly repetitive clumps of observations.
A managed services provider (MSP), is typically an information technology (IT) services provider, who manages and assumes responsibility for providing a defined set of services to their clients either proactively or as they (and not the client) determine that the services are needed. Most MSPs bill an upfront setup or transition and an ongoing flat or near-fixed monthly fee, which benefits their clients by providing them with predictable IT support costs and around the clock reliability.
A 1-to-1 marketing model in which all the information about a customer, gathered throughout the history of that customer's relationship with the company, is used to market to that customer in a way that promotes trust, loyalty, and therefore, increased sales.
An electronically distributed newsletter, most commonly sent via e-mail. Online newsletters are usually devoted to specific topics. Some Web-based newsletters are considered very valuable and are only available with a paid subscription (once payment is received, the site provides subscribers with a username and password for access).
A small, very light, and inexpensive laptop computer with limited memory, "netbooks" are best suited for general computing and accessing web-based applications. Basically they are nothing more than smaller, cheaper laptops.
Refers to an image built to 250+ pixels/inch. Desktop and offset printing requires much higher resolution than on-screen graphics, and as a result, image files are much larger. 300ppi has become the de facto standard for
print res images.
A collection of programs that enable multiple users within a system to store, modify, and extract information from a database. The system maintains the integrity of the data (its availability and organization) and permits only those with access privileges to use it. There are several different types, from small systems that run on PCs to large systems that run on mainframes.
The following systems commonly use DBMSs: computerized library systems, automated teller machines, flight reservation systems, and computerized inventory systems, to name a few. Each DBMS differs, and terms such as "relational," "network," "flat," and "hierarchical" are commonly used to describe the way a DBMS organizes information internally. This internal organization affects how quickly you can extract information. Different database management systems support different query languages, as well (such as the semi-standardized query language called SQL). Sophisticated languages for managing database systems are sometimes called "fourth-generation languages" (4GLs for short).
If you are a PC user, this Windowsprogram is one you will need to decompress most of the files you download from the Internet. (Macusers, check out StuffIt.) WinZip brings the convenience of a Windows interface to the use of ZIP files, without requiring PKZIP and PKUNZIP. The wizard makes unzipping easier than ever. WinZip features built-in support for popular Internet file formats, including TAR, Gzip, Unix compress, UUencode, BinHex, and MIME. Visit this definition on NetLingo.com to download the program.
Slang for the rarefied organizational layers beginning just above the rank-and-file. Decisions that fall from the "adminisphere" are often profoundly inappropriate or irrelevant to the problems they were designed to solve.
Like many good Internet terms, its meaning has morphed to describe the unfortunate physical side-effects of being online for an extended period of time. According to The Chronicle of Higher Education, "the condition resembles jetlag, but can also entail eye and muscle strain". You knew there had to be a word for it!