• ARTICLES
SEARCH

GEEK GLOSSARY / TECH TERMS

The VHF (Very High Frequency) spectrum covers 30Mhz to 300Mhz and is used for a wide variety of communications including television broadcasting, FM radio, as well as traffic control and marine communications.

about 8 months ago - by  |  Comments (0)

The UHF (Ultra High Frequency) spectrum, or 700Mhz communication spectrum (technically 698-806Mhz), was historically used for television broadcasting. Starting in 2008, the FCC began auctioning off sections of the spectrum in anticipation of the 2009 switch from analog to digital TV broadcasts. Thanks to the suitability of 700Mhz spectrum broadcasts for long distance wireless communication, a significant portion of the available blocks were purchased by large telecommunication companies like Verizon Wireless and AT&T.

about 8 months ago - by  |  Comments (0)

A thin client is a lightweight machine that offloads its processing and data handling tasks to a central machine. Under the thin client computing model, each thin client terminal the user interacts with is essentially just a front end that only handles rendering a local GUI for the user, while the actual computing happens on a central server somewhere else within the building or even in a remote location.  While thin client computing has the obvious disadvantage of removing the actual processing power from the local machine, it has many advantages like ease of system maintenance, increased security, and, in some applications, significant cost savings over deploying a large network of more advanced PCs.

about 8 months ago - by  |  Comments (0)

Within the designated Wi-Fi bands, such as the 2.4Ghz band, there are specific channels Wi-Fi access points may use. Although there are 14 available channels in the 2.4GHz band, each individual channel has a spread of approximately 22Mhz, which significantly overlaps surrounding channels. As such, multiple devices set to adjacent channels in a small physical space (such as an apartment block) will interfere with each other. For example, if you are having problems with Wi-Fi connectivity and sustained data transmission through your Wi-Fi router, it is recommended to check the operating channels of all detectable Wi-Fi access points to ensure your Wi-Fi access point isn’t operating on the same or adjacent channel as nearby access points. You can read more about identifying and changing your Wi-Fi channel here.

about 8 months ago - by  |  Comments (0)

A portion of the wireless communication spectrum is dedicated to wireless local area network (WLAN or Wi-Fi). Within this dedicated portion of the spectrum there are four distinct frequency bands, as specified by wireless networking standard IEEE 802.11: 2.4 GHz, 3.6 GHz, 4.9 GHz, and 5 GHz.

about 8 months ago - by  |  Comments (0)

Turn-based strategy games are computer games wherein humans (and computer opponents) complete their actions on set turns. The popular game franchise Civilization is an example of such a game style; players are allowed a period of analysis and decision making before committing to actions. The phrase “turn-based strategy” is used to distinguish games from the more common real-time strategy games where there is no downtime for analysis.

about 8 months ago - by  |  Comments (0)

Real-time strategy games are video games wherein the action occurs in real time and all players must react on the fly to changes in the game with no downtime for game analysis and decision making. The Command and Conquer and StarCraft game franchises are both examples of popular real-time strategy games.

about 8 months ago - by  |  Comments (0)

A sandbox, in computing terms, is a secure space where programs can be tested and code can be contained. In gaming, however, a sandbox refers to a game designed to be open and non-linear in nature so that the player may roam freely and interact with the environment more liberally than in a linear game where the action progresses from one level to the next.

about 8 months ago - by  |  Comments (0)

A sandbox is a restricted environment that contains the actions and effects of the sandboxed software within it. For example, a user might opt to run a web browser through sandbox software so that any attempt made by a malicious web site or poorly written code to install software or otherwise affect the operating system or files on the greater computer would be stopped.

about 8 months ago - by  |  Comments (0)

Half-duplex means that a given medium is incapable of transmitting and receiving over the same channel simultaneously. Walkie-talkies and push-to-talk cellular services are examples of half-duplex communication in action; one party can transmit communication to the other party but the receiving party must wait for the transmission to end before replying.

about 8 months ago - by  |  Comments (0)

Full-duplex means that a given medium is capable of transmitting and receiving over the same channel simultaneously. A telephone call is an example of a simple full-duplex communication: both parties can talk simultaneously as telephony technology is configured such that the line can transmit the audio in both directions at the same time.

about 8 months ago - by  |  Comments (0)

Shadow Copy, also known as Volume Snapshot Service, is a data backup technology included in Microsoft Windows that allows the operating system to take snapshots of the system which include files which are locked or otherwise inaccessible to the user. The service can only be used on NTFS-based disks and interacts with the data at the block level.

about 8 months ago - by  |  Comments (0)

System Restore is a utility included in Windows since the release of Windows Me. The System Restore utility takes snapshots of the system including the state of the Windows registry, installed applications, system files, and system settings. These snapshots, or Restore Points, can be used to roll the system back to a previous state in the event that system changes (updating Windows, upgrading drivers, etc.) render the computer unusable or unstable.

about 8 months ago - by  |  Comments (0)

Historically, computer manufacturers shipped optical media (such as CD/DVDs) with each computer that contained recovery software the purchaser could use to restore the computer back to factory settings in the event of data corruption or other problems. As a cost cutting measure, most manufacturers have moved away from optical media and now simply partition off a portion of the machine’s primary hard drive to serve as a recovery partition; this partition is not directly accessible by the end user and houses recovery software as well as an image of the computer’s hard drive as it was when it left the factory.

about 8 months ago - by  |  Comments (0)

A recovery disc is a bootable optical disc (or discs) that typically contains the base operating system and applications that came pre-installed on a commercially produced computer. In the event of severe operating system failure, failed hard drive, or other problem, the end user can boot from the discs to perform a reinstallation of the operating system and the original applications, effectively returning the computer to the state it was in when it shipped from the factory.

about 8 months ago - by  |  Comments (0)

Safe mode is a feature in modern operating systems that allows you to enter a troubleshooting mode wherein only essential components (such as the OS kernel and basic drivers for the display and input devices) are active. While in safe mode, problems with updated drivers, corrupt data, or other issues can be resolved.

about 8 months ago - by  |  Comments (0)

Ghosting, also referred to as cloning, is the process of duplicating the entire hard drive of a machine onto another machine. Although of limited utility to a home user, ghosting is widely used in corporate and government settings as it is much faster to copy an operating system/software configuration across duplicate machines than it is to independently install and configure the software on each individual machine.

about 8 months ago - by  |  Comments (0)

QR Codes, or Quick Response Codes, are a trademarked (but widely used) type of matrix barcode. Instead of encoding the data in a series of vertical stripes (as the data is encoded in a traditional UPC barcode) the QR code data is encoded in a grid that looks like a plot of pixels.

about 8 months ago - by  |  Comments (0)

Disposable email is a type of temporary email service, typically web-based, wherein a user can create an email address quickly with the intention of using it a handful of times (or even once). Many web sites require valid emails for simple tasks (e.g. downloading an application or a one-time registration) and people avoid the potential of future spam and unwanted email by providing a disposable address they can use, check to get the confirmation link, and then dispose of. One of the most popular disposable email address services is Mailinator.com.

about 8 months ago - by  |  Comments (0)

Landscape mode is an orientation wherein the display is positioned so that it is wider than it is tall. This is the orientation of movie screens, modern widescreen HDTV sets, and widescreen monitors. Smartphones also include software functionality to rotate the screen orientation from portrait (the default state) to landscape for media playback and other tasks.

about 8 months ago - by  |  Comments (0)

Portrait mode is the orientation of a display screen so that it is taller than it is wide. The default position of most smartphones is “portrait mode” as the phone design is such that it is most frequently held in the hand via the long edge. Portrait mode orientation is not typically found on television screens or computer monitors outside of specialized applications.

about 8 months ago - by  |  Comments (0)

The V-chip is an electronic chip included with televisions (with 13″+ screens) and cable boxes manufactured after January 1 2000. The chip allows parents, via in-device menu, to set a lock on the type of broadcast/cable media displayed based on content ratings. The provisions regulating the inclusion of the v-chip were part of President Clinton’s Telecommunications Act of 1996.

about 8 months ago - by  |  Comments (0)

DHCP (Dynamic Host Configuration Protocol) is the protocol that automatically assigns IP addresses to each device on a network without interaction from a system administrator or user. A common example is that of Wi-Fi devices dropping on and off a home network. Each time a device returns (or appears for the first time) on the Wi-Fi network, the router uses DHCP to assign a new and open IP address to the device.

about 8 months ago - by  |  Comments (0)

OAuth is an open standard for authorization that is widely used to allow users to authorize themselves on web applications, mobile apps, and other tools by using already existing credentials.

about 8 months ago - by  |  Comments (0)

A Hackintosh is a computer that runs Apple’s Mac OS X operating system but is not (as is traditionally the case) an Apple-built computer. Hackintoshes are typically built by users who wish to use OS X without incurring the high premium of purchasing an Apple computer.

about 8 months ago - by  |  Comments (0)