To send nasty or insulting messages via e-mail or to post them on a newsgroup or a blog. This is usually done in response to someone having broken the rules of netiquette. A "flamer" is someone who sends these message, sometimes resulting in a flame war.
Read the New York Times article below "Flame First, Think Later: New Clues to E-Mail Misbehavior"
A vendor-specific extension to SQL designed specifically for business managers. It augments SQL with
a variety of operations appropriate to data analysis and decision support applications such as ranking, moving averages,
comparisons, market share, this year vs. last year, etc. It was developed to simplify the creation of complex business queries.
A round, read-only optical storage medium made of nonmagnetic material. Read from and written to by laser, discs include CDs (Compact Discs), CD-ROMs (Compact Disc-Read-Only Memory), laserdiscs, DVDs (videodiscs), and the like.
Slang for the growing market in low-cost electric "neighborhood vehicles" (or NVs). Federal regulators recently created a new "low-speed vehicle" class, exempting these autos from conventional passenger car standards that were allegedly holding the market back.
A technology used to embed information in audio and graphical material so the content's origin can be determined (and it's destination controlled). It is implemented with lasers that carve tiny slots on the surface of CD-ROMs and DVDs.
Steganography is intended for use on digital songs, movies, and e-books, primarily to monitor intellectual property (some execs are also eyeing it as a potential advertising space).
Anyone who has ever overdrawn a bank account could soon be in the market
for a product now being developed at MIT'sMedia Lab, said
D.C. Denison in The Boston Globe. Called the "proverbial wallet,"
it literally becomes more difficult to open as its owner's bank account
runs low on money. The magnetized wallet uses embedded
technology to connect to the owner's bank account via Bluetooth.
The wallets are part of the Media Lab's mission to connect the virtual
and physical worlds. Lab researchers are also working on a 3-D
printer that can "read" a solid object and produce a 3-D copy. A
demonstration version of the printer, called "Eat Your Face," turns an
image of a person's face into a three-dimensional scullpture, made of
solid dark chocolate! - As seen in The Week, July 2010
An idea that has been around for many years (and called many names), it is a technique that allows software writers to make the same kinds of shortcuts (called "crosscutting concerns") that are made in the real world. For instance, instead of having to write a rule like "when this happens, then do this" throughout many areas of the application, a programmer can write it in one place. Championed by Gregor Kiczales at Xerox PARC, the goal is to let programmers work more quickly and at a higher design level.
A standard for storing and transmitting music in digital format across the Net. MP3 was developed in January 1988 by Leonardo Chiariglione and others at the University of Erlangen, in Germany. It is considered an amazing new standard for digital audio compression because it can compress file sizes at a ratio of 12:1 while still preserving sound quality.
For example, with a standard Wave Audio file, an audio sample at CD Quality (44KHz, 16-bit, stereo) takes up 172 bytes for every second. With MP3 compression at the standard bit-rate of 128 Kbps, each second takes only 16 bytes. By compressing at lower bit-rates, MP3's can take just 12 bytes per second, with slight quality loss.
The only disadvantage to this format is that MP3's need to be decoded during playback. This is done with a player, such as WinAmp or Winplay3. To play MP3's, you'll need a fairly decent computer (such as a Pentium 100 processor with 16 megabytes of RAM, minimum). If you have a slower machine, MP3s can still be played, but at reduced quality. You'll need an MP3 Player to hear the music while you're away from your computer.
There's more info when you click on the More button!
The practice of taking the Bieb’s name in vain to drive traffic to your Twitterhandle, blog, or Web site. In reference to Justin Bieber, "bieber baiting" is considered an Internet crime just as much as black hatting.
Software designed to create online publications, online magazines and online photo albums that have a realistic page turning effect (complete with page turning sound), replacing flat traditional documents.
Not to be confused with a "flip book" or a "flick book," a book with a series of pictures that vary gradually from one page to the next, so that when the pages are turned rapidly, the pictures appear to animate by simulating motion or some other change.
Note: The term FlippingBook™ (with a capital F and a capital B) is a trademark.
A play on the word "drumroll" this expression refers to bloggers who cite every single blog they read. For example, "Citing your references and influences is a great and necessary thing, but obsessively listing every single blog you read --the so-called 'blogroll'-- is just noise."
A set of hardware devices connected to each other in a series, where the first device connects to the computer, the second device connects to the first, the third device connects to the second, and so on. "Daisy chain" is also used as a verb to describe the act of connecting devices in this pattern.
The address or URL of a particular Web site, it is the text name corresponding to the numeric IP address of a computer on the Internet. For example: www.netlingo.com is the domain name for the numeric IP address "188.8.131.52." There is an organization called InterNIC that registers domain names for a fee, to keep people from registering the same name. To register a domain name, you can contact a company (such as Network Solutions, Inc.) or you can ask your ISP or hosting company to register names for you.
BTW: Did you know the most popular domain-length is 11 characters, and there are more than 500 63-character domains registered, including DIDYOUKNOWTHATYOUCANONLYHAVESIXTY - THREECHARACTERSINADOMAIN - NAME.com ;-) Internet trivia!
A network that uses high-speed, long-distance communications cables or satellites to connect computers over distances greater than those traversed by LANs (which range about two miles). The Internet itself is considered a WAN.
If you've ever been told to buy an "unlocked" cell phone, unlocked means that it is recharged with prepaid cards instead of being on a monthly payment plan with a single carrier. This also means that the same cell phone can be used with carriers in other countries (assuming the frequency is the same) with a simple switch of the SIM card for under $40 in most cases.�
A technology based on biology, especially when used in agriculture, food science, and medicine. Pre-1970, the term was primarily used in the food processing and agriculture industries, but it has since expanded to refer to genetic engineering, artificial selection, and hybridization.
The reason why this term is included in NetLingo is because while it combines disciplines like genetics, molecular biology, biochemistry, embryology, and cell biology, it is in turn linked to practical disciplines like chemical engineering, information technology, and robotics.
Wireless applications of the future will know what you're doing, where you're doing it, and maybe even why. The idea is known as "conceptually aware" software and networks.
Wirelessapps will be able to sense what information users need and when they need it based on who they are, the time of day, and what tasks they're working on. Then they'll deliver that information using push capabilities and alerts. For example, you'll be able to receive the information you need through e-mail messages and even voice.
It will work like this: When you get in your car, the network will know it, and it will know that it's 7:30am. Your network access will automatically switch from your computer to your phone to your car as you move through your day. It'll send you information that the freeway you're about to enter is backed up and provide an alternate route.
The key to contextually aware apps will be wireless sensors that collect and disseminate data. There will be sensors throughout your house and cities will be sensor-rich. Other examples we may see around the year 2015 are instruments that you wear to monitor a chronic health condition, or knowing whether a co-worker is available and whether he's giving a presentation in a conference room, talking on the phone, or even just moving among offices.
Sentiment analysis is a research method that aims to determine the attitude of a speaker or a writer with respect to a particular newsgroup topic, blog post, website comment, or overall tonality of a document or Web page. The attitude may be his or her judgment (or evaluation), the emotional state of the author, or the intended emotional communication.
The basic task of sentiment analysis is to classify the emotional degree of a given word in a document or sentence--whether the expressed opinion is positive, negative, or neutral. Beyond the basic emotional degree of a statement, sentiment classification looks, for instance, at emotional states such as "angry," "sad," and "happy."
However, senitment analysis can be tricky when performed by computers (or algorithms) because they often lack the "sentiment" of humans; in other words, computers do not always understand the semantics associated with feeling. For example, if a user describes a particular game as being "sick" in a gamer blog, it means something good, but the same word "sick" is not associated as a positive sentiment within health-oriented websites.
The rise of social media, such as blogs and social networking, has fueled interest in sentiment analysis. With the proliferation of reviews, ratings, recommendations and other forms of online expression, online opinion has turned into a kind of virtual currency for businesses looking to market their products, identify new opportunities and manage their reputations. As businesses look to automate the process of filtering out the noise, listening to the conversations, and identifying the relevant content so as to act appropriately, many are now moving away from market research and looking to the field of sentiment analysis. According to Wikipedia, if Web 2.0 was all about democratizing publishing, then the next stage of the Web may well be based on democratizing data mining of all the content that is getting published.
This refers to electrical devices or machines that "can be plugged in" and make use of actual electrons (such as hardware). It also refers to that which is digital and makes use of binary numbers (such as software).
A form of education in which the student learns by executing special training programs on a computer (primarily via CD-ROM or a bunch of floppies). Unlike Web-based training programs, CBT does not require an Internet connection. CBT is especially effective for training people to use computer applications, because it can be integrated within a tutorial so that students actually use an application as they study it.
A standard script for running programs on a server from a Web page. CGI programs (also called scripts) can be run independently and were designed to be external so they can run under various (possibly different) servers interchangeably. The most common CGI scripts found on the Web are programs that process the information a user enters on a form. For example, whenever you fill in information or choose from a list of radio button options on a Web page, you are most likely filling out a CGI form. Once you hit the "submit" button, the form is sent to the server. There, the form's output is handled by a CGI script, which will call on other programs as necessary (such as a database search engine or a mailer program). Gateways conforming to this specification can be written in any language that produces an executable file. Some of the more popular languages that use CGI include: C or C++, Perl, Python, TCL, shells, and many others.
A person who plays any one of many electronic games, including video games, PC games, online games, handheld games, wireless games, and interactive TV games. The term "gamer" is usually reserved for enthusiasts who are considered to be experts in the realm of playing interactiveonline games.
For the largest list of Internet acronyms and text message jargon, click on "more info" below!
A customized domain name. As of June, 2011, a Web address can only end with one of 22 suffixes — .com, org or .org|.org]] and .net are among the most popular — but soon websites will end with more tailored suffixes such as .kids, .shop or .nyc (known as a brand domain).
The body in charge of deciding the rules for website names, ICANN (International Corporation for Assigned Names and Numbers), announced in June, 2011 that it will liberalize the market of address endings — also known as gTLD’s, generic top-level domains — allowing anyone to choose whatever suffix they want for their website, including ideograms and Arabic characters.
An input/output (I/O) device that allows you to send commands to a computer that's somewhere else. At a minimum, a terminal consists of a keyboard, a display screen, and some simple circuitry. Usually, on a PC, you will use terminal software such as Telnet, which emulates or pretends to be a physical terminal, allowing you to type commands to a remote computer.