A Cybrarian is a librarian who does most of their research and information retrieval via the internet, or an individual who specializes in using the internet as an information gathering and resource tool.
Dogfooding refers to the practice of internally using a product or service a company has developed before offering or releasing it to the public.
A Dictionary Attack is a form of brute force attack used to discover passwords for user accounts, computers, and servers via the systematic entry of the words found in a dictionary.
CRUD (short for Create – Retrieve (or Read) – Update – Delete) refers to the elemental functions or processes that are conducted with a set of data or a persistent database.
CPI (Characters Per Inch) refers to the density or number of typographic characters that will fit into an inch of printed line for a given font.
A Directory Harvest Attack (DHA) is a method used by spammers in order to build a database of valid (working) e-mail addresses. This is done by generating lists of random or common names and sending them out to valid domains like Yahoo, Gmail, etc.
Droupie (short for Data Groupie) is a nickname for an individual who enjoys spending time with people who are technical and/or more computer literate than they are.
Cooked Data refers to raw data that has been analyzed, extracted, manipulated, organised, presented, and/or processed for further use.
C-HTML (a.k.a. Compact HTML, CHTML, cHTML, and i-mode-HTML) is a subset of standard HTML that was specifically adapted for use with small, ‘limited ability’ electronic devices such as mobile phones (older/earlier versions) and PDAs.
Data At Rest refers to data that is archived or kept for reference, and is rarely (or never) changed or updated. Data At Rest may be stored in encrypted form on a variety of sources such as: servers, backup storage, external backup mediums, an employee’s hard drive, etc.
A Dark Data Center is a computer facility that remains in a ‘lights out’ condition the majority of the time, with all monitoring and administration of the facility being done remotely. The only time a Dark Data Center has people active in it is to conduct maintenance or repair work.
A Captive Portal is a web page that a user is presented with, and must interact with, before being allowed access to a particular network.
Calm Technology refers to the practice of minimizing the amount of information that a user is burdened with at any one time when interacting with technology.
A Stop Word is a common word such as “a, of, on, the” that is not indexed and/or is ignored by search engines during a search query. The reason these words are not included is due to their frequent use in the language(s) individuals are using with a search engine. Excluding Stop Words also helps save time when a search engine is returning results for a search query.
Brochureware refers to the practice of directly translating a printed brochure into a web page without utilising any of the capabilities a web page format offers.
Black Surfing refers to the practice of browsing the internet with an inverted color palette (i.e. white text on a black background). It was a highly favored practice to save energy when people used CRT monitors in the past. With the advent of LCD monitors however, there is no need for the practice since it makes little difference in the amount of energy used.
A Security Token (a.k.a. an Authentication Token) is a small hardware security device in the form of a swipeable card, key fob, or USB type of device.
An Arachniography is the web-based equivalent of a bibliography. Taking things one step further, an annotated Arachniography is the web-based version of an annotated bibliography.
Steganography refers to hiding encrypted data or information inside of a common or completely innocent looking file such as an image, audio, or video file.
Stickiness refers to the ability of a website to encourage visitors to stay longer and/or return more often. The more interesting, useful, or fun the content of a website is, the more Stickiness it has.
A WetPC is a waterproof wearable computer built specifically to withstand high underwater pressure. It allows divers to gather and enter data when conducting underwater studies, then transfer the data to a desktop computer via a serial cable after returning to the surface.
A War Dialer is a program used to dial phone numbers and test them for a connection to a computer modem. The program then adds the numbers with a successful modem connection to a database.
Spim is the term for spam that is delivered via instant messenger or chat services. While the volume of Spim is not as bad as the volume of spam can be in our inboxes, it is more annoying in the sense that it displays directly when received, rather than being relegated to a junk or spam folder like it would in our inboxes.
Sneakernet refers to the transfer of electronic information, data, images, etc. by physically carrying it via a flash drive or other storage medium between different computers or networks.
User-Generated Content (UGC for short) refers to content such as information, data, news, reviews, blog posts, photos, videos, comments, etc. that an unpaid contributor has uploaded or provided to a website. Occasionally, the website in question will republish, promote, and/or possibly make a profit from User-Generated Content.