The day the Nasdaq crashed, which incidentally, was on the anniversary of the sinking of the Titanic.
Friday, the 14th of April 2000, signaled the end of a remarkable speculative high-tech bubble starting in spring 1997. The closing of the Nasdaq at 3321 corresponded to a total loss of over 35% since its all-time high of 5133 on the 10th of March 2000.
A method in which businesses raise money by accumulating small investments from many people online. It is considered a social networking approach to fundraising, which works well for philanthropic sites.
The name given to a method by which your online personal data is hacked and exposed. Because some Wi-Fi networks are unsecure, "sidejacking" works like this: When you login to a secure Web site or browse the Web on an unsecured Wi-Fi network, the fact is everything from the contents of your e-mail to who your friends and acquaintances are, could be easily exposed by hackers.
Even though some sites, such as Gmail, offer secure, SSL-based login pages, things aren't as secure after you login. Unlike many bank Web sites that offer a secure browsing experience for the entire duration of the session, most sites dump the user right back out into unsecured territory after logging in, thus exposing their personal data to anyone who wants to get at it.
The solution is to stick to secured Wi-Fi networks that you know and trust (such as your home network that would not have any strangers on it running packet sniffers). But when you do need to use public access points, avoid accessing Web pages that might transmit personal information. For those of you who want to be extremely careful, you should never use a Wi-Fi hotspot unless you are using VPN (virtual private networking) or SSL (secure sockets layer) to access your accounts.
A project that's intentionally sabotaged in order to make way for the approval of a different project, as in "The data-warehouse project was a POF with SQL so the data group could implement Oracle instead."
The dream job for a generation of hackers: A company paying you to break into its network. By simulating attacks from the net or from an internal source, ethical hackers locate weak spots in a company's network. Then they work with clients to prioritize which are the most serious threats, and suggest solutions.
The newest form of online advertising, "social ads" are small, banner-like ads tied to social networking users' activities and placed on their profile pages. For example on Facebook, members use mini-feeds and news feeds to keep up with the activites of their friends. So, for example, a friend of "Erin" might receive an update in their news feed that she just bought an iPhone, and include Erin's photo as well as a small Apple ad with an image of an iPhone and a link to the Apple site. Social ads are the result of a combination of social action and content, and it spreads virally.
Marketers can target social ads according to more than a dozen demographic and behavioral criteria--including country, age, gender, political views, movies, and relationship status. Ads are typically sold via auction on a CPC and CPM basis.
A pun on "gas station" this term refers to a theoretical fill-up spot in the not-too-distant future; it reflects America's growing love affair with hybrid cars and vegetable-based fuels, including ethanol and biomass fuels, some of which are distilled from grass.
A west coast version of Wall Street. It is the long road between Highways 101 and 280 in Silicon Valley that is home to a high percentage of VC firms, Internet startups, research centers, as well as Stanford University.
Battery-powered, ultrasonic transmitters. Small enough for a key chain or a belt, they're worn by people or placed inside objects. They broadcast a 48-bit pulse to receivers that are embedded in ceilings.
Here's how they work: By using the speed of sound, the receivers compare the transmitter's arrival time at three or more locations and calculate the wearer's precise position. A computer then uses this location information to create zones of "usage" and "availability" around objects and people. For example, if a person's zone overlaps an object's zone, the person becomes the temporary "owner" of that device (whether it is a workstation or digital camera). So, there is no need to log on, and whatever you create using that device (such as a document or a picture) is automatically stored on a server in your personal file. Far out. About 800 bats are in use at the AT&T Lab in Cambridge, England.
The name of an online video commercial that appears prior to an online video, it is typically :10 - :15 seconds in length. Once you click on certain online video links, you will be forced to watch a short commercial before the video content. This snippet of online advertising is known as "a pre-roll" or just "pre-roll" (as opposed to a mid-roll or post-roll).
Pre-roll looks the most like traditional TV commercials, and online advertisers claim it is better for three main reasons: 1) It has increased accountability (you are forced to watch it), 2) it targets a more engaged user due to its on-demandformat (you clicked on the link to see it), and 3) it has a handy interactive component (you can take an action regarding the ad if you're interested). Some websites let you skip over the commercial spot, but most do not.
Pre-roll makes up a small percentage of the available interactive video inventory, but it is growing more popular due to the fact that online publishers can pretty much guarantee that users will see and hear the pre-roll commercial before the audio stream starts. It is also one of the simplest ways to utilize the Internet for sight, sound and motion.
The latest of all cyber threats, this form of digital attack is aimed towards businesses and government agencies and is designed to capture sensitive information from key insiders' computers.
Many "cyberattack" crime groups in Eastern Europe and Asia spy on employee PCs that have access to high profile and confidential data, resulting in credit card fraud, access to bank account information, and other valuable data.
Often times cyber attacks are launched through an email attachment that contains a malevolent code, and when opened, installs a tiny program on the victim's PC that will eventually copy the desired sensitive information. These emails may appear innocent, even disguised as an email coming from a business associate, making cyberattacks very difficult to detect.
A computer network or Internet service that lets users send and receive files and information over the Internet without fear of being monitored or logged. The service allows people to use an untraceable address in the "darknet," where they cannot be personally identified.
A Swedish high-tech company has launched such a service because "the right to exchange information in private is fundamental to the democratic society. Without a safe and convenient way of accessing the Internet anonymously, this right is rendered null and void." The service offers a neutral IP address on top of your existing ISP service through a strongly encrypted VPN connection.
An encryption method that uses the concept of a key ring. The key ring has two keys: a public key that is made available to everyone and a private (or secret) key that is known only by the private key holder. The public and private keys are designed to work together. Anyone can use the public key to encrypt data, but only the person with the corresponding private key can decrypt the data; this helps to protect the content of messages. Conversely, anyone can use the public key to decrypt data, but only if it was encrypted with the corresponding private key; this helps to ensure the identity of the person sending the data.
Software that models the dynamics of a real scenario in order to create a computerized version for learning and training. For example, real-time simulation is used for airline and fighter pilot training. Animated runways and enemy flight forces are recreated in a room called a simulator. A simulator also involves a headset, a chair, and other elements to ensure that it moves and sounds like the real thing. Computer simulation can also refer to the process of imitating a real phenomenon with a set of mathematical formulas (for example, weather conditions, chemical reactions, or biological processes). Any phenomena that can be reduced to mathematical data can be simulated on a computer.
The name of the platform that runs social networking services. It is a set of application programming interfaces (APIs) that allow independent Web developers to build applications that run on social networking sites, using the data stored by that network. For example, Facebook uses a proprietary API (known as FBML) whereas Google's OpenSocial uses an open standard that can be adopted by anyone on the Web.
"The edge" also refers to the boundary between a local network and the backbone. In that sense, it describes a way of getting around Internet traffic jams. For example, moving digital libraries in a centralized server to caches at the margin (or "the edge of the network") will place the library content nearer to subscribers.
A "sandbox" is a staging environment that allows for testing and isolates untested code changes from the production or live environment. This can be thought of as a trial run before the Web page has been published.
A fancy name for wearing our electronicgadgets as a second skin. Researchers have discovered a way to create circuits so thin and flexible —from heart monitors to cell phones— that they can be applied like temporary tattoos.
Historical perspective: By using wires thinner than a hair and mounting them in flexible sheets of silicon and rubber, researchers were able to make digital patches that are as soft and elastic as human skin. These "epidermal electronic systems" can be rubbed on with water instead of needing tape or glue to attach, and they’re small enough to be recharged with solar power. Researchers say the technology will be nearly invisible to wearers and could be used instead of bulky machines to record medical patients’ vital signs. The paste-on computers will also let people interact with video games and MP3 players using muscle or voice commands. According to co-author John Rodgers, they will “blur the distinction between electronics and biology.”
Slang for a federal employee who's neither rank-and-file nor a full-fledged supervisor (i.e., someone with all of the responsibility and none of the authority or appropriate compensation of a supervisor). The Feds have recently begun using the more dignified-sounding "team leader."
A triple-play network is one in which audio (phone), video (TV), and data (Internet) are all provided in a single access subscription. The transmission medium may be fiber optic, cable, or satellite. Triple-play networks exist in many parts of the U.S. and in several other countries.
A family of fiber-optic transmission rates initiated by Bellcore so that the RBOCs could create an infrastructure for new broadband services. SONET was created to provide the flexibility needed to transport many digital signals with many different capacities, and to provide a standard for manufacturers as the use of broadband transmission increases. The transmission rates are from 51.84 Mbps to 13.22 Gbps.
In a general sense, it refers to using someone else's technology. Specifically, it means to hop on board someone else's unsecured wireless network in order to access the Internet with your laptop or mobile device. For example, "let me stop in that hotel lobby, I may be able to piggyback onto their network without having to pay for the Starbucks hotspot." Another example, "At the moment, Google and Yahoo are not charging consumers to piggyback onto their mapping engines."
The telephone number you use to dial into your Internet Service Provider (ISP). To connect to the Internet, you must first establish an account with an ISP in your area. It is important to get a local access number because part of the beauty of the Internet is that you can surf Web sites, find information, and communicate with people all over the world for the cost of a local telephone call. Once you sign up with an ISP, you will receive a list of local or 1-800 telephone numbers you can use to connect to the Internet (see: dial-up connection). Take note: Sometimes, access numbers can be frustrating because of continuous busy signals or no answer at all. Be sure to ask your ISP to provide you with a few alternate access numbers in case this happens. FYI: You can call your ISP anytime and have them walk you through the process of setting up your computer for Internet access-that's what tech support is there for :^)
Technically ubiquitous computing refers to a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. As opposed to the desktop model, in which a single user consciously engages a single device for a specialized purpose, someone using "everyware" engages many computational devices and systems simultaneously, in the course of ordinary activities, and may not necessarily even be aware that they are doing so.
Let's look at a couple of examples: In one instance, an everyware computing environment might interconnect lighting and environmental controls with personal biometric monitors woven into clothing so that illumination and heating conditions in a room might be modulated, continuously and imperceptibly (see also: smart clothes). Another example involves refrigerators that are "aware" of their RFID tagged contents, and hence able to both plan a variety of menus from the food actually on hand, and warn users of stale or spoiled food (see also: smart home).
Coined by Adam Greenfield, there are a variety of terms that describe the everyware paradigm. These include general terms, like "pervasive computing," "ambient intelligence," and "tangible media," as well as terms that are primarily concerned with the objects involved, such as "physical computing," the "Internet of things," "haptic computing," "things that think," and "spime."
A free, downloadable audio file that can be listened to on your computer--where you can burn it to a compact disc--or on an MP3 player or iPod to enjoy on planes, trains and automobiles. Podcasts were originally thought of as amateurish audio versions of blogs, but no longer; ESPN, NPR, the BBC, Newsweek, news commentators and other highly respected people have podcasts readily available.
Also called object-oriented graphics, these programs store images in the form of mathematical representations that can be resized and scaled without distortion. These "draw programs" (as opposed to paint programs) are well suited for architecture, computer-aided design, interior design, and other applications in which precision and scaling capability are more important than artistic effects. Vector graphics use computer algorithms to describe shapes, lines, animation, and so forth. The technology of vector graphics is growing in popularity because the images are scalable and smaller in file size, a plus for online viewing and downloading. Vector graphics were developed in response to the limitations of raster-based graphics (popularly known as GIF and JPG), which use pixel-by-pixel definitions and cannot be resized reliably.
Based on a popular social networking site, the term "facebooking" has emerged as a verb to describe the activity of logging in to Facebook in order to create a profile, share personal information, and meet other members.
Facebook started as an onlineforum to connect students through networks at schools. It has since been opened up to the population in general. People use Facebook to look up people at their school, see how people know each other, find people in their classes, meet other people, and more often than not, flirt.
Considered one of the new forms of Web socializing, "facebooking" has become so popular that just about any college student you know, is likely to tell you that he or she is a member. In fact, many students check their Facebook accounts more often than they check their e-mail.