In short, podcasting lets everyday users distribute audio files over the Internet for playback any time on computers or digital music players. It is the process of creating an audio show of some sort available in MP3 format via an RSS feed that supports enclosures. Podcasts are designed to include talk shows, tutorials, music, or other audio content.
Hey, give a geek an iPod and what's he going to do? Write a script to automatically fill it with interesting content. Let's say you have a downloadable audio show that you're interested in listening to on a regular basis because it has something with new material each time. In the past you would have to go to the Web site and locate the new download where you'd manually grab the MP3 file and listen to it. With podcasting, online publishers put together RSS feeds that announce when the file is available. With the right kind of feedreader, you can have the file automatically downloaded as soon as it is released. This way there is only one step: "automatic downloading" in which the software takes the download and copies it into your digital music player (such as an iPod, hence its name "podcasting"). The idea is that if you go to sleep with zero music on your iPod, you can wake up and the new audio files will be waiting for you to listen to them.
Some netizens believe podcasting will revitalize the art of radio. All you need are rudimentary recording tools, free software, and a speedyInternetconnection. Like the bloggers before them, podcasters are changing the nature of the medium.
Even some big companies, such as Oracle and IBM, are already using podcasting as a means of disseminating company information, there are questions about the effectiveness of audio-only presentations (especially for selling purposes). Still, as a technology, podcasting is inexpensive and awaits creative niche uses.
For those of you who still don't quite get it, think of it like the desktop aggregator: You can subscribe to a set of feeds, and easily view the new stuff from all of the feeds together, or view each feed separately. Podcasting works the same way, with this exception: Instead of reading the new content on a computer screen, you listen to the new content on an iPod or digital music player. (The format used is RSS 2.0 with enclosures.) For a quick sample of the latest podcasts, check out the link below!
A form of text-based online advertising, double-underlined links are ad media that are meant to be relevant and unobtrusive. The way it works is this: the double-underlined links scan each page for appropriate keywords and contextual relevancy. The keywords are pre-chosen by the online publisher to be relevant to the site, however, more often than not, they appear due to supply and demand. If a match is found, a clearly visible advertising link (usually indicated by a green or blue double underline) is auto-generated. When you hover your mouse over this type of link, a small pop-up box will appear with the sponsored ad information in it. If you don't "scroll over" or click on a link, your reading experience is uninterrupted.
Double-underlined links make use of server-side technology, meaning it resides within the online publisher's Web site. This is meaningful because unlike cookies, no code or information is passed to your computer, and therefore it does not compromise your privacy. If you use a browser prior to Internet Explorer 5.0, Netscape 7.2, or Firefox 0.8 or later, you won't see double-underlined links.
One of the seven "baby Bells" created by the break-up of "Ma Bell" (AT&T) in 1984: Ameritech, Bell Atlantic, Bell South, Southwestern Bell, Pac Bell, US West, and NYNEX. The baby Bells, in turn, own twenty-two smaller BOCs (Bell Operating Companies) that provide local telephone service.
A ringtone is the sound made by a cell phone when it rings and it specifically refers to the customized sounds one selects on his or her mobile device.
In telecommunication jargon, cell phones (also called wireless phones, mobile phones, and handheld phones) are a mobile communication system that applies a mix of radio wave transmission and common telephone switching to enable telephone communication to and from mobile users within a specified area. The "ringtone" facility was provided so that people would be able to determine when their phone was ringing when in the company of other mobile phone owners.
Ring tones have proved a popular method of personalizing phones. People like the idea of customizing their phones with their favorite music, however, some people find certain ringtones annoying in certain public situations. As such, many people opt to use the vibrate feature on their cell phone when in public. A mobile vibrator is a mechanical device designed to generate vibrations instead of ringtone. They are mostly used for noisy environments, such places where ringtone noise would be disturbing or for the hearing impaired.
Some basic technical properties of mobile phone ringtones include MIDI. A mobile phone ringtone is a MIDI (Musical Instrument Digital Interface) file that is played by a mobile phone. These tunes can be monophonic (very simple because the phone can only deliver one sound/beep at a time) or polyphonic (with multiple phonetic values consisting of several tone series or songs). As of 2007, 16 separate sounds can be produced by the phones that carries polyphonic ringtones. This makes for music that is rich in texture and the tunes seem more like the music you hear on CDs. Furthermore, polyphonic ringtone sounds can also include voices.
Enough explanation ;-) The fun of ringtones is picking out your favorite sound so that each time your cell phone rings, you get to hear it! Cell phones from companies such as Nokia, Motorola, Samsung, Siemens, Sony-Ericsson, LG, Sanyo, and Panasonic have ringtone capabilities. Some phones allow you to have a different ringtone for each person who calls you. Usually the ringtones are pre-loaded on the phone but you can also download your own ringtones to personalize your handheld experience.
An invisible technology, it is similar to a LAN in that the computer to which the network is connected responds the same way it would to an ordinary wired Ethernet. The only difference is that the data packets are transmitted and received over radio waves, not cables or wires. Network devices "built to spec" transmit signals around the 2.4 GHz band. The only problem is that Wi-Fi, HomeRF, and Bluetooth (which all share the same 2.4 GHz frequency range) are not compatible with each other. That could mean disruption, interference, or obsolescence if a different standard should emerge.
The term "orphans" refers to extra lines of programming that do not serve the program's objective. They refer to nothing, lead nowhere, and are usually removed as part of the final debugging and compiling process.
The term "tween" stands for "in between" being a teenager and a child, and generally refers to prepubescent kids who are 9-12 years old. It refers to the breaking point of a child when he or she rejects more childlike images and associations and aspires to be more like a teen.
Here's an example of its usage: "You should add 'crdtchck' as shorthand for 'Credit Check' because it is an important topic that will become more relevant for GenY and tweens. Tweeners seem to be texting all the time, don't you think?" Yes I do ;-)
Click on "more info" below for a list of texting shorthand!
Those features of the American landscape (strip malls, motel chains, prefab housing) that are exactly the same no matter what part of the country you're in. "We were so lost in generica, I actually forgot what city we were in."
As technology evolves so do careers in music announcing. In addition to the development of VJ's (video jockeys for music television) there is also the performance position of the Internet disc jockey (or "net-J"). Many enterprising webcasters have begun their own radio stations broadcasting strictly over the Internet. As the number of Internet radio stations continues to grow, so does the public's awareness of using the Internet as another form of radio.
This seemingly cryptic looking term is actually the word "I'm" (the contraction of "I am"). When you see "IB4m" online, it's most likely because the statement "I am" has been distorted due to different computer programs rendering the apostrophe differently. In other words, the reason this term appears as IB4m instead of I'm is because of gremlins. Gremlins are mysterious characters that sometimes appear on your computer screen, in text documents, or in e-mail messages. For example, if you type a word with an apostrophe using Microsoft Word and then copy it over into HTML, the apostrophe may appear as a small box instead.
The same thing happened years ago when this code " & n b s p ; " suddenly appeared all over the Web (which is actually the HTML code for the "&" sign). Some browsers didn't interpret the HTML code for the "&" sign correctly so they displayed the actual cryptic looking code.
FYI: I've seen several forums where people from different countries post questions and it appears that the computer software running the forum is interpreting "I'm" as "IB4m" I also saw "I'd" rendered as "IB4d" (example link below).
The yottabyte is a unit of information (or computer storage) equal to one septillion bytes (which is one long scale quadrillion or 1024) or equal to one quadrillion gigabytes.
Derived from the SI prefix yotta- as of 2011, no storage system has achieved one zettabyte of information. The combined space of all computer hard drives in the world does not amount to even one yottabyte, but was estimated at approximately 160 exabytes in 2006. As of 2009, the entire Internet was estimated to contain close to 500 exabytes.
The term "yobibyte" (YiB), using a binary prefix, is used for the corresponding power of 1024.
A term that describes someone who fights spam. It is a play on the words "tree hugger," which refers to a person who climbs a tree to protest its cutting down, a "bandwidth hugger" sets his or her computer to not yield any system capacity (a.k.a. bandwidth) to junk e-mail.
It means how relevant a Web page is to the keywords a user enters when doing an online search. It refers to where a Web site or Web page is ranked within search engine results. For example, if your Web site is an Internet dictionary, when a person queries "Internet dictionaries" in a search engine, your ranking indicates where in the search results your page is listed. You will hear it used like this: "My ranking on Google is within the top 5 results!"
An online advertising method where the advertiser delivers an experience to the audience, rather than just clicking on a picture. During a "surround session" the goal is that the advertiser controls every major ad position for a set number of pages. This allows the advertiser a more prolonged relationship with the user, while also telling a story, similar to television.
The act of copying music from a CD into a music file which you can later play on your digital audio player. It's easy to "rip" CDs, all you need is a media management software (such as Microsoft Windows Media Player). You save the ripped music in a folder on your computer's hard drive and then copy it to your MP3 player. You can rip all kinds of files including WAV and streaming audio.
The classic definition of a "drone" involves several aspects including (1) Male honeybees which gather no honey; (2) One who lives on the labors of others; a lazy, idle fellow; and (3) That which gives out a monotonous tone or dull sound. Leave it to the worker bees to come up with a term called "office drone." It is a nickname given to the laziest person in the cube farm, or the one who tries to pass off as much work as possible while still maintaining the semblance of productivity (see also: throw it over the wall).
In other words, if your life resembles a Dilbert character, your colleagues may be secretly calling you the office drone behind your back. However most office drones are keenly aware of their sluggardness and openly acknowledge it, for example "As the token office drone, I am constantly looking for ways I can break free of the monotonous, death pit of Entry-Level Temp Work."
A slang expression that refers to people telling the online world about themselves. For example, once you've posted personal (or professional) information about yourself on a social networking site or a blog, you're said to have "opened the drapes" meaning it's there for anyone and everyone to see. Just be sure not to do a drug dump!
An automated program that extracts information from fields in registration forms. An auto-parser will detect and report errors or incomplete information in forms. (When filling out a form online, you may have received an annoying message, such as, "You didn't include your fax number," that required you to go back and fill in the entire form again. That's the auto-parser at work). Upon receipt of complete and correct registration forms, the auto-parser enters the appropriate data into a company's database.
A pricing model that defines how much revenue a publisher receives when a viewer clicks on a banner ad and is taken to the advertiser's Web site. The publisher is only paid if the viewer becomes a qualified lead by completing the registration form or signing up for the offer the advertiser is promoting.
Advertisers constantly battle for their online ad to get the most views so that they can sell their product. The first page that a Web user lands on after signing in gets "first eyes". This term is used by many ISPs and portals, as it refers to the first opportunity at selling and influencing a user.
The Web makes room for a new third party in a shopping transaction; a metamediary sits between buyers and sellers, offering a centralized, unbiased source of information and resources related to a specific task, such as buying a home or car. From this point, customers can educate themselves on the top, research options and prices, and when ready, jump directly to related vendors in the marketplace.
Slang for turning off any device that people can reach you on (like a cell phone, two-way pager, computer, home phone, etc.) in order to avoid a certain person. For example, "Hannah is blacking out Tucker because he was acting like an idiot to her friends. She doesn't play that way!"
A feature of HTML that gives both Web site developers and users more control over how Web pages are displayed. With CSS, designers and users can create style sheets that define how different elements, such as headers and links, appear. These style sheets can then be applied to any page on a particular Web site. So in theory all the pages can be formatted the same way making it much easier. The term cascading derives from the fact that multiple style sheets can be applied to the same Web page. CSS was developed by the W3C.
A blog that focuses on news events and items that cover a particular neighborhood in great detail -- and in particular, places that might be too physically small or sparsely populated to attract much traditional media coverage. Because of this, many people have associated "placeblogs" with the term "citizen journalism," which refers to news gathering and reporting done by non-journalists.
The action of adding an e-mail address to your address box to ensure you receive it.
Since spam has become such a big problem, most e-mail services and Internet Service Providers (ISPs) have put some sort of blocking or filtering system in place to tell the good guys from the bad. Unfortunately these systems for stopping spam are far from perfect and they often block e-mail messages that you have, in fact, requested (also known as a false positive).
To make sure you receive the newsletters and e-mails you want, whitelist every new subscription right at the start, before delivery is interrupted. This means adding the address in the "From" line of a valued e-mail to your address book.
As you've probably realized by now, technology is complicated and the instructions for whitelisting are different for every e-mail system :-( NetLingo is here to help! Use the link below to read whitelist instructions for the most popular e-mail programs!
FYI: In computing, a "blacklist" is an access control mechanism that means allow everybody except members of the blacklist. The opposite is a "whitelist" which means allow nobody except members of the white list. As a sort of middle ground, there is something called a "greylist" which serves as a temporary blacklist that could be used, for example, to block poorly-configured e-mail clients that may be used to send undesirable e-mail. And yet another form of list is the "yellow list" which is a list of e-mail server IP addresses that send mostly good e-mail but do send some spam (for example, Yahoo!, Hotmail, Gmail). The term "yellow listed server" is a server that should never be accidentally blacklisted. The yellow list is checked first and if listed then black list tests are ignored.
The online equivalent of "Black Friday" this expression refers to the Monday after the Thanksgiving holiday. It goes like this: In the brick-and-mortar world, the day after Thanksgiving is one of the year's biggest days for shoppers and retailers. The longtime nickname "Black Friday" historically came from the notion that this is the day when sales pushed money-losing stores into the black. In the click-and-mortar world of online shopping, the following Monday is the peak day for shopping and online transactions, thus it is cyber Monday (or "Black Monday"). The reason it occurs on Monday is attributed to the fact that consumers take advantage of high-speed Internet connections at work to do their holiday shopping.
A corporate executive who steps in to help an Internet start-up get off the ground or to help steer a struggling business through tough times. They are often replaced by a CEO once the storm has been weathered.
Technically it is audio data that is stored on a computer system, represented by a binary system (1's and 0's), and read by audio software. In layman's language it is music files that can be downloaded, played, and shared on any number of devices. On the Internet, music is digital and it comes in several file formats.
There are three major groups of audio file formats:
Uncompressed audio formats, such as WAV, AIF, and AU;
Lossless compression formats (which allows the exact original data to be reconstructed), such as FLAC, APE, WV, TTA, Apple Lossless, WMA; and
Lossy compression formats (which does not allow the exact original data to be reconstructed from the compressed data), such as MP3, AAC, lossy WMA.
Also known as ad banner or online ad, is a graphical Web advertising image usually placed at the top of content pages that links to the advertiser's content page. The standard size for a "banner ad" is 468 pixels
wide by 60 pixels tall.
In the study of language, semantics refers to the meaning of words. Therefore, a "semantic search" will search and discover the meaning of words, unlike the typical search engine method of searching only for the occurrence of keyword(s) on a Web page.
A semantic search makes it easier to locate relevant information to the user's subject of interest, saving the user a lot of time reading through unrelated Web pages.
Known as the next generation in Web site search engine technology, every Web page indexed by a semantic search engine uses a unique set of tags. These tags go beyond providing keywords and descriptions, they provide content and relationships.
A buzzword created in Silicon Valley, referring to the management of information that treats human attention as a scarce commodity, and applies economic theory to solve various information management problems. In other words, "attention economy" is a marketplace where consumers agree to receive services in exchange for their attention. Examples include personalized news, personalized search, alerts, and recommendations to buy. Economists agree that a key point is about the consumer having a choice - they get to choose where their attention is 'spent'. Another key ingredient is relevancy - as long as the consumer sees relevant content, he or she is more likely to stick around (which creates more opportunities to sell).