SEARCH

GEEK GLOSSARY / TECH TERMS

Data Furnace refers to the theoretical concept of placing servers in the basements of residential homes, apartments, and offices as a source of heat for those buildings. Since servers generate large amounts of heat, it was theorized that a Data Furnace could be a cheaper source of heat for people while helping large companies save money in comparison to running full-blown data centers.

about 2 months ago - by  |  Comments (0)

Foxed is the term used to ‘describe’ when a website receives a warning letter about copyright violations and/or is forced to remove copyrighted material from the website in question.

about 2 months ago - by  |  Comments (0)

FUD (short for Fear, Uncertainty, and Doubt) is a marketing strategy used to create a sense of insecurity in users and customers about a competitor’s product. If effective, users and customers will be discouraged or hesitant about buying the competing product and stay with their current product supplier instead.

about 2 months ago - by  |  Comments (0)

A DTN (short for Disruption Tolerant Network) is a network that has been specifically designed to withstand anomalies, disturbances, limitations, temporary (or intermittent) communications problems, and outages with as little impact as possible on regular network operations.

about 2 months ago - by  |  Comments (0)

A Domain Sniper (a.k.a. Domain Sniping) is an individual or organization that searches for and registers well-known or popular website domains whose registration has lapsed by accident or forgetfulness. The Domain Sniper will then offer to sell the domain back to the original registrants for a ‘price’.

about 2 months ago - by  |  Comments (0)

An Extranet is a private network or website that is not available to the general public, but is specifically set up for customers, partners, suppliers, vendors, etc. Access to an Extranet will require the appropriate login and password credentials, and can either be free or require a subscription.

about 2 months ago - by  |  Comments (0)

An Ethical Worm is a program that works its way through a network searching for software that needs to be updated and/or patches that need to be applied for known vulnerabilities. Like the malicious version, an Ethical Worm will most likely operate on and update the computers in a network without users being aware of its presence.

about 2 months ago - by  |  Comments (0)

A Cybrarian is a librarian who does most of their research and information retrieval via the internet, or an individual who specializes in using the internet as an information gathering and resource tool.

about 2 months ago - by  |  Comments (0)

Dogfooding refers to the practice of internally using a product or service a company has developed before offering or releasing it to the public.

about 2 months ago - by  |  Comments (0)

A Dictionary Attack is a form of brute force attack used to discover passwords for user accounts, computers, and servers via the systematic entry of the words found in a dictionary.

about 2 months ago - by  |  Comments (0)

CRUD (short for Create – Retrieve (or Read) – Update – Delete) refers to the elemental functions or processes that are conducted with a set of data or a persistent database.

about 2 months ago - by  |  Comments (0)

CPI (Characters Per Inch) refers to the density or number of typographic characters that will fit into an inch of printed line for a given font.

about 2 months ago - by  |  Comments (0)

A Directory Harvest Attack (DHA) is a method used by spammers in order to build a database of valid (working) e-mail addresses. This is done by generating lists of random or common names and sending them out to valid domains like Yahoo, Gmail, etc.

about 2 months ago - by  |  Comments (0)

Droupie (short for Data Groupie) is a nickname for an individual who enjoys spending time with people who are technical and/or more computer literate than they are.

about 2 months ago - by  |  Comments (0)

Cooked Data refers to raw data that has been analyzed, extracted, manipulated, organised, presented, and/or processed for further use.

about 2 months ago - by  |  Comments (0)

C-HTML (a.k.a. Compact HTML, CHTML, cHTML, and i-mode-HTML) is a subset of standard HTML that was specifically adapted for use with small, ‘limited ability’ electronic devices such as mobile phones (older/earlier versions) and PDAs.

about 2 months ago - by  |  Comments (0)

Data At Rest refers to data that is archived or kept for reference, and is rarely (or never) changed or updated. Data At Rest may be stored in encrypted form on a variety of sources such as: servers, backup storage, external backup mediums, an employee’s hard drive, etc.

about 2 months ago - by  |  Comments (0)

A Dark Data Center is a computer facility that remains in a ‘lights out’ condition the majority of the time, with all monitoring and administration of the facility being done remotely. The only time a Dark Data Center has people active in it is to conduct maintenance or repair work.

about 2 months ago - by  |  Comments (0)

A Captive Portal is a web page that a user is presented with, and must interact with, before being allowed access to a particular network.

about 2 months ago - by  |  Comments (0)

Calm Technology refers to the practice of minimizing the amount of information that a user is burdened with at any one time when interacting with technology.

about 2 months ago - by  |  Comments (0)

A Stop Word is a common word such as “a, of, on, the” that is not indexed and/or is ignored by search engines during a search query. The reason these words are not included is due to their frequent use in the language(s) individuals are using with a search engine. Excluding Stop Words also helps save time when a search engine is returning results for a search query.

about 2 months ago - by  |  Comments (0)

Brochureware refers to the practice of directly translating a printed brochure into a web page without utilising any of the capabilities a web page format offers.

about 2 months ago - by  |  Comments (0)

Black Surfing refers to the practice of browsing the internet with an inverted color palette (i.e. white text on a black background). It was a highly favored practice to save energy when people used CRT monitors in the past. With the advent of LCD monitors however, there is no need for the practice since it makes little difference in the amount of energy used.

about 2 months ago - by  |  Comments (0)

A Security Token (a.k.a. an Authentication Token) is a small hardware security device in the form of a swipeable card, key fob, or USB type of device.

about 2 months ago - by  |  Comments (0)

An Arachniography is the web-based equivalent of a bibliography. Taking things one step further, an annotated Arachniography is the web-based version of an annotated bibliography.

about 2 months ago - by  |  Comments (0)