SEARCH

GEEK GLOSSARY / TECH TERMS

Abandonware, a portmanteau of abandoned and software, is a popular but nebulous term used to refer to software which is still informally distributed, but for which no author, company, or other agency is actively distributing the application or enforcing ownership rights on said application.

about 10 months ago - by  |  Comments (0)

Adware, a portmanteau of advertisement and software, is a term used to denote a hybrid between freeware and shareware applications. Like freeware, adware is generally completely free to use. Like shareware, the author wishes to receive compensation for their work. With adware this goal is achieved via in-application advertisements or the installation of browser toolbars or other external helper applications which present advertisements to the reader. In this fashion, the author of the application receives a stream of income from their application without directly charging the end user.

about 10 months ago - by  |  Comments (0)

Shareware, a portmanteau of share and software, is a popular term which denotes that a given application is intended to be freely shared and distributed but that some form of monetary compensation is due the author. In most cases shareware functions as a sort of demonstration of the software which is either restricted by functionality (the user does not have access to all the functions) or by time (the user has full access to the program but only for the first 30 days). After the trial period, the user is required to purchase a license or other method of unlocking the application to continue using it.

about 10 months ago - by  |  Comments (0)

Freeware, a portmanteau of free and software, is a popular term which denotes that a given application is available for use either without monetary compensation to the author or owner of the application, or with a suggested donation (a sub-classification of freeware referred to as donationware).

about 10 months ago - by  |  Comments (0)

Email filters are text masks which help users manage their email as well as reduce spam. User-generated filters can perform useful tasks–such as sorting all emails from retailers they frequent into a specific folder, or all automated receipts into an archive. Server-based filters can stop large volumes of spam from flooding users inboxes by carefully removing emails sent from known spam nodes or containing spam advertisements.

about 10 months ago - by  |  Comments (0)

A boot manager is a small utility that loads before a computer loads its primary (or secondary) operating systems that allows you to select which (of multiple) operating systems you wish to load at the given moment. Many people use boot managers to allow them to easily boot between Windows and Linux or between multiple versions and distributions of Linux installed for different purposes.

about 10 months ago - by  |  Comments (0)

The browser (rendering) engine is the software component within a given web browser that renders the HTML code of fetched web pages into a human-readable interface. Competing browser companies will frequently tote the benefits of their rendering engine over a competitor’s rendering engine.

about 10 months ago - by  |  Comments (0)

Browser chrome is the space that borders the main view portal of a web browser–including the menus, navigation bar, frame, scroll bars, and address bar. Google’s web browser Chrome was named such as a sort of inside joke–the ultra minimalist browser didn’t actually have much chrome to speak of.

about 10 months ago - by  |  Comments (0)

Tabbed browsing is a feature of modern web browsers wherein additional viewing portals may be opened within the same primary window (and are distinguished from each other with tab-like structures at the top, similar to the folder tabs in a file cabinet). Although innovative browsers have had tabs as far back as the birth of the Web, it wasn’t until the early 2000s that tabbed browsing became mainstream–prior to that, opening a link while simultaneously keeping the parent page open would result in a completely new browser window.

about 10 months ago - by  |  Comments (0)

Hypertext is the foundation of the World Wide Web and the browsing experience. Every link that you click is a form of hypertext–even when represented by an image–that links the document you’re viewing to the document you’re about to visit.

about 10 months ago - by  |  Comments (0)

The web cache, or browser cache, is a mechanism for the temporary storage of web documents intended to reduce bandwidth usage, server load, and the user’s perception of browser latency.

about 10 months ago - by  |  Comments (0)

Offline browsing is a feature available on most modern web browsers wherein the user can access the web browser’s cache and browse the pages there as if they were actively connected to the original web server. Offline browsing is most useful with static pages with completely embedded content–many modern web pages are modular and call many of their design elements in a fashion which does not translate cleanly or smoothly into offline browsing.

about 10 months ago - by  |  Comments (0)

Just like your spinal cord connects the tens of thousands of peripheral nerves in your body, massive high speed fiber optic lines connect major cities and regions. These “internet backbones” link the smaller networks built by individual Internet Service Providers, which in turn connect to the end user. When you send a file to a friend across the country, for example, the data leaves your home network, passes to the local ISP maintained network, and then from your ISP’s local/regional network over one of the major internet backbones until the process is reversed to deliver the data from the backbone, to the regional network, and then down the final leg to your friend’s home network.

about 10 months ago - by  |  Comments (0)

An ISP, or Internet Service Provider, is the company that provides internet access between the greater internet infrastructure and the end consumer. In other words, the company you pay to provide “the last mile” of connectivity to your home or business is your Internet Service Provider. In addition to providing simple TCP/IP network connectivity, most ISPs also offer an array of peripheral services including email hosting, small personal web hosting, and increasingly–as large telecommunication and media companies continue to merge–phone and premium television access, too.

about 10 months ago - by  |  Comments (0)

The rise in popularity of Wi-Fi enabled devices has fueled an interest in mobile hotspots–small devices that act as a hybrid cellular modem and Wi-Fi router. The mobile hotspot connects to nearby towers via the cellular network and shares the data connection it establishes with nearby Wi-Fi enabled devices, just like a regular Wi-Fi node shares its hard-wired data connection.

about 11 months ago - by  |  Comments (0)

A cellular modem is an add-on device for a mobile computer that plugs into a USB port or ExpressCard slot to provide cellular data service to the mobile computer. While many people tether their phones to their computers in order to gain access to their cellular data plan, this practice is frowned upon by many cellular providers. Dedicated cellular modems are an official way for cellular subscribers to add mobile data to their devices.

about 11 months ago - by  |  Comments (0)

Tethering is the process by which a computer is connected to a cellphone in order to provide internet access to the computer. Tethering was originally a wired process, wherein a cellphone would be connected to the computer via specialized cable (and later via standardized USB cable) in order to share its data connection with the secondary machine. Advances in phone design have made it possible to tether a cellphone to a computer or other secondary device via both Bluetooth and Wi-Fi.

about 11 months ago - by  |  Comments (0)

Localization is the process of customizing software and accompanying documentation for a specific region, country, or social group. The process includes text translation, adaptation of user menus, and inclusion of specialty characters. In many operating systems, the bundles of localized files and settings are called “locales”.

about 11 months ago - by  |  Comments (0)

A task manager is a computer utility which allows the user to view the status of all running applications and background services. Typical features include the ability to monitor CPU and memory usage globally as well as on an app-by-app basis. In addition, users can request more information about individual applications and terminate applications which are not responding or otherwise non-functional.

about 11 months ago - by  |  Comments (0)

Thermal paste, also commonly called thermal grease, is a conductive substance used to form a seal between two objects to ensure a consistent and thorough transfer of heat. When installing a new heat sink on a computer, for example, you need to clean off the thermal paste residue from the previous heat sink and then add a thin layer of thermal paste onto the new heat sink before tightening it down. This process creates a seal between the hot body of the CPU and the metal of the heatsink where the heat can migrate more effectively than it could through an air gap.

about 11 months ago - by  |  Comments (0)

The Fn key (FuNction key) is a special key found primarily on notebook computers. Not to be confused with the Function Keys (typically F1-F12 on a regular desktop keyboard) the Fn key is a modifier key designed to give keyboard buttons a secondary function. It is common, for example, for notebook computers to have symbol labels on their top row numeric keys designating system functions accessible via the Fn key (e.g. the 1 key + FN yields monitor dimming or the 5 key + FN turns the Wi-Fi on and off).

about 11 months ago - by  |  Comments (0)

In addition to the standard function keys on a keyboard (typically F1-F12), many modern keyboards include special function keys that are specifically designated for a given purpose, such as controlling the computer’s multimedia functions, hibernating the computer, opening specific folders such as My Documents, or otherwise providing one-button access to individual functions.

about 11 months ago - by  |  Comments (0)

The function keys, typically labeled F1 through F12, are hardware keys on a computer keyboard reserved by the operating system or the current application to perform a given function. Common function key assignments include F1 to open the help file and F5 to refresh the content of the current pane (such as in a file explorer or web browser).

about 11 months ago - by  |  Comments (0)

An email storm is when a very large volume of email messages are sent within a very short span of time. This has the potential to temporarily cripple both the sending and receiving mail servers. Although email storms may be generated by viruses that have gained access to user’s email clients (or even the email server itself), some of the largest mail storms have been generated by human error–typically when a mailing list is improperly configured and a single user is able to reply-all to tens of thousands of other list recipients.

about 11 months ago - by  |  Comments (0)

The at sign (@), originally and traditionally called the ampersat, is a symbol used to separate the user from their domain within an email address, such as admin@google.com, where the user is “admin” and the domain is “google.com”.

about 11 months ago - by  |  Comments (0)