A phrase that describes intense periods of heavy use on a network system. It also refers to a large group of people who converge at the same time and the same place due to transmitting messages via text, email, Twitter, Facebook and other social networking sites. This term was coined by sci-fi writer Larry Niven in The Flight of the Horse.
The foundation software of a computer system, responsible for controlling and launching the installed applications and computer peripherals. Common operating systems include MS-DOS, Unix, OS/2, Macintosh, and Windows. It is the software that schedules tasks, allocates storage, handles the interface to peripheral hardware, and presents a defaultinterface to the user when no application program is running.
Earbuds are a pair of small headphones held inside of one's ears and connected to a signal source such as an an iPhone, MP3 player, or other device (sometimes an audio amplifier, radio, or CD player). These "in-ear" versions (specifically known as earbuds or earphones) differ from headsets in the sense that headsets are used to describe a combination of headphone and microphone used for two-way communication, for example with a telephone or VoIP service.
The name for a cell phone service that provides background noise, such as noise from a traffic jam, to enable the owner to say with authority, "Sorry I'll be two hours late, I'm stuck in traffic" (while actually sitting at a cafe). These services can also generate a ring tone in the middle of a conversation (appearing to signal an incoming call), providing a plausible excuse for ending the current call.
A heat map is a graphical representation of data where the values taken by a variable in a two-dimensional table are represented as colors. In the online world, Web "heat maps" have traditionally been used for displaying areas of a Web page or email most frequently scanned by visitors (in terms of clicks, mouse movements, and even eye-tracking). Heat mapping also refers to the live stream online display of where people are congregating at a particular time.
This term is usually seen in an error message in programs such as Netscape to let the user know that the stream of information he or she was downloading has been forcibly cut. This can occur for several reasons, most commonly because you are on a very crowded network or your access provider (ISP) is experiencing heavy traffic.
A Web browser plugin created by Macromedia that enables Director movies to be viewed on World Wide Web pages. It is one of the best programs for viewing interactiveanimation. Shockwave is a key component of Macromedia's solution for Web professionals who develop digital media for the Web. If you have created an interactive movie, using Director, you will need to compress it with Afterburner before you can use it as Shockwave on a Web site.
Companies that reside in electronic networks rather than physical buildings, allowing them greater flexibility to change in size and configuration as market conditions dictate. Refers to click-and-mortar versus brick-and-mortar.
Similar to monitoring software, parental control software refers to "all-in-one" monitoring that enables parents to control, restrict and monitor anyone who uses the computer.
Internet filtering and parental control software programs give parents the ability to control and monitor their child's use of the Internet no matter where they are: in the neighboring room, at work, on vacation, it is designed to enable parents to protect children "from the dangers of the Internet." Truth is, this industry is very fragmented, meaning there is no one leader and no one solution.
For more information about parental control software, click on the NetLingo Resources link below.
A form of phishing, "spear phishing" specifically refers to crimeware that fine tunes phishing attacks by correlating specific names and e-mail addresses about where a person banks or shops, and then customizes spoofed messages to trick individuals into clicking on a viral attachment or harmful Web link. Once that happens, the intruder can then take full control of the victim's PC.
If you suspect you have been phished, forward the e-mail to firstname.lastname@example.org or call the FTC help line, 1-877-FTC-HELP. Phishing
is a variation on the word "fishing," with the idea that bait is thrown
out in the hopes that while most will ignore it, some will be tempted
into biting. Phishing can be a noun or a verb, while "a phish" or "a
phisher" is the person doing the phishing.
A form of webcasting that uses streaming audio technology to deliver radio programming over the Internet. You need an audio streaming application (such as RealPlayer) before you go to a Net radio Web site. Net radio technology is very popular with college radio stations because of its low cost and the ability to reach a wider audience. It is also popular with road warriors who use Net radio to listen to programs such as local sports games in their home town, while they're on the road.
When users visit certain Web sites, you may see a "favicon" in the browser address bar next to the URL, and in your list of favorites next to the title of the Web site you've bookmarked. Favicons act as a branded icon as these small images are often modified versions of a company's logo. Most browsers support favicons, including IE 5/6+, Firefox 1+, Mozilla 1+, Netscape 7+, Opera 7+, Konqueror 3+, and Safari.
Bookmark NetLingo and you will see our favicon! It is the image above ;-)
The state of a computer when it's not connected to a host system or to the Internet. This term is also used in the middle of a heated business meeting, where someone may say, "Let's discuss that offline." It usually means there is someone in the room who shouldn't hear what is being said, or more subtly, that "this is not the time to be talking about that-let's follow-up on it offline," as in after the meeting.
To switch back and forth between two modes. Common toggle keys include Caps Lock, Num Lock, and Scroll Lock. "Toggle" also means to type in alternating UPPERCASE and lowercase letters. For example, "gReGo LiKeS tO dO tHiS sTuFf."
Refers to the administrative details that are found on a Web site. For example, the legal, copyright, liability, and licensing information. In the past, privacy issues were also categorized as "administrivia", however, with the increased awareness for security on Web sites, privacy is viewed as a more prominent topic.
An engineering term, "cutover" is the process of transitioning from one system to a a new system. It specifically refers to switching from an old (hardware and/or software) system to a replacement system, covering the overlap from when the new system is live until the old system has been shut down.
Sometimes known as "going live" the cutover is the point at which a new program or system takes over, usually from a previous version, and the old program is no longer used. On major developments, this point is reached when the new software has been written, tested, and runs satisfactorily, in parallel with the old, for an agreed period.