Лінгвістичний словник "Інноваційні одиниці англійської мови сфери комп’ютерних технологій XXI століття"

Про матеріал
Словник містить п’ятсот інноваційних одиниць, які виникли в англійській мові сфери комп’ютерних технологій XXI століття. У словнику надано дефініції мовних інновацій, наведено приклади їх використання у текстах ЗМІ англомовних країн. Cловник також містить приклади інновацій, що є літерно-цифровими абревіатурами.
Перегляд файлу

Міністерство внутрішніх справ України

ДНІПРОПЕТРОВСЬКИЙ ДЕРЖАВНИЙ УНІВЕРСИТЕТ

ВНУТРІШНІХ СПРАВ

 

 

 

 

 

 

 

М.А. Кізіль 

 

 

 

ІННОВАЦІЙНІ ОДИНИЦІ АНГЛІЙСЬКОЇ МОВИ 

СФЕРИ КОМП'ЮТЕРНИХ ТЕХНОЛОГІЙ 

XXI CТОЛІТТЯ

 

 

Лінгвістичний словник

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Дніпро

«Ліра ЛТД»

2017

УДК 811.111:004.738(038)„20”

К 38

Рекомендовано до другу Вченою радою

Дніпропетровського державного університету внутрішніх справ  (протокол № 6 від 09.02.2017 р.)

 

 

РЕЦЕНЗЕНТИ:

Махачашвілі Р.К.  доктор філологічних наук, доцент, завідувач кафедри романської філології  та порівняльно-типологічного мовознавства Київського університету ім. Бориса Грінченка;

Лазєбна Н.В.  кандидат філологічних наук, доцент,     доцент кафедри теорії та практики перекладу     Запорізького національного технічного університету.

 

 

Кізіль М. А

К 38 Інноваційні одиниці англійської мови сфери комп’ютерних технологій XXI століття: Лінгвістичний словник /

М. А. Кізіль. – Дніпро : Дніпроп. держ. ун-т внутр. справ ; Ліра ЛТД, 2017. – 128 с.

 

ISBN 978-966-383-878-6

 

Словник містить п’ятсот інноваційних одиниць, які виникли в англійській мові сфери комп’ютерних технологій XXI століття. У словнику надано дефініції мовних інновацій, наведено приклади їх використання у текстах ЗМІ англомовних країн. Cловник також містить приклади інновацій, що є літерно-цифровими абревіатурами. 

Для студентів, викладачів,  науковців-філологів, аспірантів і всіх тих, хто цікавиться питаннями неології, лексикографії та лексикології.

 

 

УДК 811.111:004.738(038)„20”         ISBN 978-966-383-878-6

 

 

© Кізіль М.А., 2017

© ДДУВС, 2017

© Ліра ЛТД, 2017

 

 

 

 

 

ЗМІСТ

 

 

 

ВСТУП .............................................................................................................. 4

 

A ‒ Z ………………………………………………………………………….. 6

 

СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ .................................………...….... 124

 

СПИСОК ДЖЕРЕЛ ЛЕКСИКОГРАФІЧНОГО МАТЕРІАЛУ ………........ 125

 

СПИСОК ДЖЕРЕЛ ІЛЮСТРАТИВНОГО МАТЕРІАЛУ ..…...................... 126

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


 

 

ВСТУП

 

На початку XXI століття сфера комп’ютерних технологій стає однією із головних сфер-постачальниць інноваційних одиниць на  позначення її нових понять і реалій в англійську мову. Основними сферами їх функціонування  є комп’ютерна техносфера, суспільно-політична сфера, сфери економіки та бізнесу, медицини, науки та освіти,  культури.  

Середовищем породження та функціонування інноваційних одиниць виступає, насамперед, сама техносфера комп’ютерних технологій, в якій постійно відбуваються зміни, вдосконалюються та створюються нові комп’ютери, комп’ютерне та комунікаційне обладнання, програмне забезпечення і т.ін. Такі  поняття та реалії поняття потребують інноваційного позначення. Саме тому в англійській мові з’являються одиниці, що стають засобами номінації  видів і моделей комп’ютерів,  їх модифікацій, технічних характеристик, програмного забезпечення та  нових програм, видів комп’ютерних помилок, спамів, вірусів, антивірусів, назв фахівців  комп’ютерної галузі,  понять і реалій інтернет-сфери.  

 Впровадження комп’ютерних технологій у суспільно-політичну сферу англомовних спільнот зумовило появу та функціонування інноваційних одиниць, що слугують засобами номінації: розбіжностей у соціальноекономічному статусі людей  з огляду на факт наявності в них комп’ютерної техніки; різних соціальних і вікових груп осіб, позначених інноваціями  з урахуванням рівня володіння нею; професій людей, які працюють у різних соціальних сферах і користуються комп’ютером на роботі; станів людей, викликаних тривалою роботою за комп’ютером або його відсутністю; видів і засобів соціального спілкування, що здійснюється через мережу Інтернет; видів соціальних проблем, зумовлених її масовим використанням; зміни в політичному житті та устрої англомовних країн. 

 Інноваційного позначення протягом останніх десятиліть отримали в англійській мові поняття та реалії сфери економіки та бізнесу англомовних суспільств, поява та функціонування яких зумовлена впливом і розвитком сфери комп’ютерних технологій. Такі одиниці є засобами номінації комерційних компаній, організацій, магазинів, стратегій їх розвитку, підприємців, що здійснюють свою діяльність через мережу Інтернет, а також видів електронної торгівлі, електронних грошей, реалій інтернетбанкінгу і т.ін.

 Впровадження комп’ютерних технологій у сферу науки та освіти англомовних спільнот визначила процес поповнення  лексико-семантичного складу англійської мови інноваційними одиницями, що є засобами номінації нових наук, поява та розвиток яких визначається розвитком сфери комп’ютерних технологій та базується на її надбаннях; нових наукових понять і технологій, які впроваджуються  в різні сфери життєдіяльності представників англомовного світу, зумовлюючи їх розвиток. Особливу роль комп’ютерні технології відіграють  у розвитку освіти англомовних країн, модифікації її системи, виникнення нових форм і засобів навчання на всіх її рівнях:  від початкової школи до університетів. Подібні факти знаходять своє відображення  в  цілому ряді англомовних інноваційних одиниць на їх позначення. 

 На мовному різні вплив комп’ютерних технологій на  сферу культури англомовного світу відбивається в інноваціях, що є одиницями номінації нових засобів масової інформації, поява та розвиток яких стає можливим завдяки піднесенню інтернет-сфери та комп’ютерної техніки. Такими одиницями є засоби номінації  інтернет-версій англомовної друкованої періодики, нового виду телебачення, телевізійних служб, програм тощо. Інновації відображають також зміни, що відбуваються в інших сферах культури англомовних країн, зокрема в галузі кінематографії та мультиплікації, аудіовізуального мистецтва.

У словнику зібрано інноваційні одиниці, що виникли в англійській мові сфери комп’ютерних технологій XXI століття. Ці одиниці почали активно вживатися у засобах масової інформації  англомовних країн, про що свідчать наведені контексти їх використання.  Cловник також містить приклади інноваційних одиниць, які є літерно-цифровими абревіатурами. Їх поява та вживання пояснюється самою цифровою природою мови комп’ютерних технологій, тим фактом, що літерно-цифрові «паттерни» віртуального комунікативного простору сприяють компресії та економізації її одиниць.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A

 

1.    аcoustic snooping  Stealing typed data by decoding the sounds of the keyboard strokes.

Researchers at the University of California, Berkeley, have discovered that by making highly accurate recordings of computer keyboard strokes, they were able to reconstruct e-mail messages, retrieve data entered into a report, and recreate passwords typed into a secured Web site, essentially overhearing Internet conversations, says The Futurist magazine. They used audio gear available over-the-counter. ‘The message from this study is that there is no easy escape from this acoustic snooping’, contends Doug Tygar, one of the researchers (The Globe and Mail, December 27, 2005).

 

2.    address munging. Altering one’s return email address in an effort to thwart companies and individuals who send out unsolicited commercial email.

A guide to email spam describes safeguards and filters which the average user can employ on his own behalf, including address munging (The Irish Times, May 10, 2000).

 

3.   advergamen. A web-based computer game that incorporates advertising messages and images.

In the new report, MPs said they agreed with the PHE study that there must be ‘broader and deeper controls on advertising and marketing to children’. They said: “In our view, a logical way to do this would be by restricting all advertising of high fat, salt and sugar foods and drinks to after the 9pm watershed. ‘We also endorse Public Health England’s recommendation of extending current restrictions on advertising to apply across all other forms of broadcast media, social media and advertising, including in cinemas, on posters, in print, online and advergames’ (The Herald, November 30, 2015).

 

4.   ad blocker n. A piece of software designed to prevent advertisements from appearing on a web page.  

Mozilla launches Focus, a new ad-blocker for iOS (The Verge, December 8, 2015).

 

 

5.   affective computing n. Computer technology that uses biometric sensors to detect physical characteristics that relate to moods and emotions; the computer simulation of moods and emotions.

Imagine if a computer could sense if a user was having trouble with an application and intuitively offer advice. The irritating paperclip that embodies Microsoft’s Office Assistant could be a thing of the past. The software industry has tried to make applications more intelligent but many fall far short of being genuinely useful. However, this could be about to change.

Kate Hone, a lecturer in the department of information systems and computing at Brunel University, is the principal investigator in a project that aims to evaluate the potential for emotion-recognition technology to improve the quality of human-computer interaction. Her study is part of  a larger area of computer science called affective computing, which examines how computers affect and can influence human emotion (Computer Weekly, June 24, 2003).

 

6.   altmetrics n. Tools used to assess the impact of scholarly articles based on alternative online measures such as bookmarks, links, blog posts, and tweets.

Luckily, there is a growing movement within the scientific establishment to better measure and reward all the different ways that people contribute to the messy and complex process of scientific progress. This movement has begun to gather loosely around the banner of ‘altmetrics’, which was born out of a simple recognition. Many of the traditional measurements are too slow or simplistic to keep pace with today’s internet-age science (Wired Science, January 9, 2012). 

 

7.   algo-sniffing pp. Using securities trading software designed to detect other trading programs.

But there are two rather more predatory strategies. One is called algosniffing. Here, a super-fast computer tries to find other computers going about their everyday business of buying or selling shares, and figures out what they’re going to do and when.

The algo-sniffer can then get ahead of the game and exploit the slower computer. And of course you could have algo-sniffer-sniffers and algosniffer-sniffer-sniffers in a high-frequency arms race. No wonder speed can be so important (BBC News Magazine, August 10, 2012).

 

 

8.   algorithmic trading  Securities trading in which orders are generated by algorithms and executed by computers operating over high-speed links to market exchanges.

Considered cutting edge on Wall Street these days, algorithmic trading involves predicting prices and volume several seconds forward. Many of the strategies originated within small, proprietary trading houses (Traders Magazine, April 1, 2003).

 

9.   Alt-Tab v. To switch from one running computer program to another.

On a recent morning I was toiling away, when my PC began talking—not something I normally expect when I’m working in Microsoft Excel. I heard voices, then music. I Alt-Tabbed through my running apps until I came to the AIM client with my active buddy list. Running in the top of the window was a roughly 240-by-120 video of the trailer for a new Ben Affleck movie (PC Magazine, January 14, 2004).

 

10.                      annotated reality Text, images, sounds, and other information related to the surrounding area supplied to a person from a wearable computer.

She detailed the idea of calm technology, the creation of a digital interface that is invisible, where the real world is the screen and a person’s actions are the buttons. People can choose the kind of information that’s presented in the real world, creating an annotated reality (The Houston Chronicle, March 12, 2012).

 

11.                      anternet n. The mechanism that harvester ants use to regulate foraging activity, which is analogous to the mechanism used to regular internet data transfers.

Computer people call it Transmission Control Protocol, which is an algorithm to deal with data congestion. They send out files and see how long it takes to receive a reply.With little bandwidth availability, it takes longer than when availability is high. Sending out a patrolling ant and waiting for it to return is much the same. The analogy is so strong, in fact, that at Stanford they are now calling the internet the anternet (The Express, May 21, 2013).

 

12.                      Apple picking pp. Snatching a person’s iPhone, iPad, or iPod.

Nabbing electronic devices isn’t new. But lately it is growing ‘exponentially’ according to a 2011 report from the New York Police Department. The lucrative secondhand market for today’s niftiest handsets has produced an explosion in ‘Apple picking’ by thieves. A used iPad or iPhone can fetch more than $400 (The Wall Street Journal, July 27, 2012).

13.                      apps-on-tap n. Software applications that are rented from and maintained by a third-party vendor over the Internet.

Today, US companies spend $300 billion a year on infotech. But, says Boston Consulting Group Inc., only 33 per cent of major software projects save money or boost sales. Corporations have realized that outsourcing IT could increase the efficiency of technology investments by 20 per cent. That’s because apps-on-tap lets companies pay for just the computing they actually use (Computers Today, July 6, 2000).

 

14.                      app poverty line The minimum income level that a programmer requires to make an independent living developing apps.

Though the app stores continue to fill up with ever more mobile applications, the reality is that most of these are not sustainable businesses. According to a new report out this morning, half (50%) of iOS developers and even more (64%) Android developers are operating below the ‘app poverty line’ of $500 per app per month(TechCrunch, July 21, 2014).

 

15.                      arachnerd n. A person who spends a great deal of time either surfing the web or fussing with their home page.

Revenge of the arachnerd. When Spider-Man debuted in 1962, he was unlike any superhero who had come before and the new film reportedly clings to Peter Parker’s foibles and vulnerabilities (Tulsa World, May 3, 2002).

 

16.                      attention minute n. One minute of a person’s attention, particularly when used as a measure of engagement with a website or other content.

We built attention minutes to look at a wide range of signals — everything from video player signals about whether a video is currently playing, to a user’s mouse movements, to which browser tab is currently open — to determine whether the user is still engaged. The result is a finegrained and unforgiving metric that tells us whether people are really engaged with our content or whether they’ve moved on to the next thing (Upworthy, February 6, 2014)

 

17.                      audioblog n. A blog that contains mostly music or other audio content.

Audioblogs typically contain conversation, but music audioblogs are more often called ‘MP3 blogs’ and contain promotion tracks from major music labels as well as copyrighted and non-copyrighted works from private collections  (The Boston Globe, July 31, 2005).

18.                      augmented reality A view in which a computer superimposes images onto the user’s field of vision.

Mann is one of the pioneers of a form of computing known as ‘augmented reality’, in which information technology acts as a thin membrane between the user and his or her environment (The Globe and Mail (Canada), February 28, 1998).

 

19.                      autofail n. An error introduced into a message by automatic spellchecking or word-completion software, particularly when that error is indecorous or nonsensical.

It was the PG version of what’s come to be known as the autofail, the accidental (and sometimes mortifying) autocorrection from which many a blog and book have spawned (The New York Times, January 9, 2015).

 

 

B

 

20.                      back-hacking p. Attempting to catch a computer hacker by tracing the path that the intruder used to infiltrate a system.

Based on system management software, like HP OpenView or Tivoli, the system can look for false positives and reroute good data back into the network. Once the decoy server has the malicious code it can also track and trace the code back to its source.

‘It becomes a back-hacking device’, said Ciongoli (InfoWorld Daily News, June 4, 2004).

 

21.                      bacn n.Non-personal, non-spam email messages that you have signed up for, but do not necessarily want or have time to read.  

In a world where BACN is the new SPAM, Unsubscribe.com is the new SPAM blocker(BlackBerry Cool, May 27, 2011).

 

22.                      barfmail n. An email message spewed out in all directions.

Can’t seem to make sense of a particular acronym? Netdictionary will nail down terms as picturesque as barfmail (bouncing e-mail) and as vital as spray (multiple hosting of Web pages) (The Australian, August 26, 2000).

 

23.                      bashtag n. The use of a corporation’s Twitter hashtag to bash the company’s products.

Here’s a cautionary tale for the corporate social media consultants of the world. Last week, McDonald’s launched a Twitter campaign using the hashtag McDStories; it was hoping that the hashtag would inspire heartwarming stories about Happy Meals. Instead, it attracted snarky tweeps and McDonald’s detractors who turned it into a bashtag to share their McDHorrorStories (Forbes, January 24, 2012).

 

24.                      beehacker n. A beekeeper who uses digital tools and technology to help monitor and manage a collection of hives.  

Ordinary beekeepers may need high-tech help, but it’s not clear how they can afford it. Tom Rearick, an electrical engineer, and some fellow ‘beehackers’ are trying to change all that(IEEE Spectrum, May 1, 2011).

 

25.                      billion laughs n. An online attack that attempts to disable a website by sending a specially formatted sequence of characters such as ‘lol’ and

‘ha’.

Wouter Coekaerts discovered that ejabberd, a distributed XMPP/Jabber server written in Erlang, is vulnerable to the so-called ‘billion laughs’ attack because it does not prevent entity expansion on received data (Debian, March 31, 2011).

 

26.                      birds-of-a-feather meeting  A meeting held at a computer-related trade show or conference in which people who work in the same technology area at different companies exchange information and experiences.

There are two essential types: those who are serious about absorbing as much new technical and product information as possible in order to continue their quest for the holy grail of Java applications, and those who treat JavaOne as a corporate paid vacation. The first type of attendee devotedly marks off his preferred technical track sessions and birds-of-a-feather meetings in his schedule, while the second immediately scouts out the free services afforded by this college-campus-like atmosphere ( JavaWorld, August 1, 2000).

 

27.                      bitcom n. A short, sitcom-style video available over the Internet.

The Web site DailyComedy.com, a venture ‘aimed at overthrowing the current comedy regime’, guarantees new laughs every day. 

The site staffs 15 comedians who post new bits several times a day in text, video and audio formats; the constant updates ensure that the jokes lampoon the most up-to-the minute newsmakers and current events. Users can rate and comment on the material. Also featured are ‘bitcoms’, brief, sitcom-like videos made for quick Internet viewing (Chattanooga Times Free Press, August 9, 2006).

 

28.                      bitlegging pp. The illegal copying of software and digital music.

Bitlegging’ describes the unlicensed downloading of copyright material, while ‘ransomware’ denotes programs that illegally encrypt personal files to prevent access (Printweek, May 17, 2007).

 

29.                      black-hole resort n. A resort that blocks all incoming and outgoing Internet signals.

Maybe you’ve heard of the latest luxury gimmick of the 21st century. It’s called the ‘black hole resort’. The deal is this: You check into this resort to get away from the Internet, television and the telephone ‒ and you pay extra for the privilege (Richmond County Daily Journal, January 12, 2012).

 

30.                      BlackBerry thumb n. A repetitive stress injury characterized by swelling and pain at the base of the thumb and caused by prolonged use of the thumb while operating a BlackBerry or other personal digital assistant.

BlackBerry thumb is a repetitive strain injury that causes tendons at the base of the thumb to become inflamed as a consequence of hyperextension and awkward positioning, as can occur during extended use of a BlackBerry or other smartphone (Canadian Medical Association Journal, August 9,

2011); … there are others around the globe who complain of more painful maladies – BlackBerry thumb for instance (The Press (New Zealand), February 2, 2008).

 

31.                      blog n. A web page consisting of frequently updated, chronological entries on a particular topic.

Blogs are set up to be personal forums for someone’s opinions. That’s the point, the liberating thing about them. Bloggers don’t have to get their copy past an editor, and they can sound off at any length — no word limits in cyberspace. They’re products of a seismic cultural shift that makes someone’s hangover as newsworthy as the arrival of a Harry Potter novel. The sassier the voice, the more successful the blog is likely to be (The Washington Post, November 16, 2003).

 

32.                      blogebrity n. A famous or popular blogger.

His blog-ebrity status earned him a political column in 2003 on Gaper’s Block, a local news and events Webzine (Chicago Tribune, April 18, 2007).

 

33.                      blogger, n. Особа, яка друкує журнал або веде щоденник в мережі Інтернет (перв. БВ)

 

34.                      blogject n. A manufactured object that regularly posts updates about its state, location, and environment.

Design conferences such as Lift and Where 2.0 feature the latest blogjects, mashups, and distributed narrative installations ( MIT Press, March 22, 2013).

 

35.                      blog book n. A book consisting of or based on entries posted to a blog.  

Lander is the blogger/author of the blog book of the same name, a mostly hilarious takedown of contemporary «Caucasian culture» (The Seattle Times, September 4, 2009).

 

36.                      blogosphere n. The collection of all bloggers, blog sites, blog readers, and blog text.

One more way to communicate: blogging, a form of online journal. Blogcount, a Web site that tracks what it calls the ‘blogosphere’, estimated there were nearly 3 million active Web logs in June 2003 (Sun-Sentinel, November 30, 2003).

 

37.                      bluejacking n. Temporarily hijacking another person’s cell phone by sending it an anonymous text message using the Bluetooth wireless networking system.

Presently, bluejacking doesn’t provide the sender with personal data. Your device remains safe from any data modification. What bluejacking creates relates more to annoyance and the uncertainty of the sender’s identity and immediate location. By design, Bluetooth’s technology allows sending wireless information 30 feet or more. Devices that have this technology include mobile telephones, personal digital assistants and computers. There’s no software to prevent bluejacking and only a few solutions (The Wall Street Journal, July 27, 2012).

 

38.                      body shopper A contractor in a Third World country who recruits local programmers and shops them around to software companies in North America.

A ‘body-shopper’ by profession, Mr. Reddy takes calls from around the world and then scours the ancient city of Hyderabad for the best and brightest computer kids to send to Silicon Valley and beyond (The Globe and Mail (Canada), July 14, 2000).

 

 

39.                      bot herder n. A hacker who controls a large number of compromised computers for malicious purposes.

We’re fighting a war of intelligence. The bot herders keep advancing and moving forward at a fast rate, and we just can’t keep up. There are just too many obstacles in our way, Evron added.

The complex setup now includes the use of hijacked computers to host the DNS (Domain Name System) servers that provide domain resolution services for the rogue. 

This allows a bot herder to dynamically change IP addresses without changing a DNS record or the hosting  and constant moving around  of phishing Web sites on bot computers(eWeek, October 16, 2006).

 

40.                      bohrbug n. A software error that is easily and routinely repeatable.

Second, although Heisenbugs may constitute the majority of software faults in some environments, our experience indicates that many network failures resulting in extensive system outages have been caused by rarely triggered Bohrbugs. As an extreme example, 99% Heisenbugs may contribute only 1% of total down time because they can be easily bypassed, while the remaining 1% Bohrbugs may cause 99% of total down time (IEEE Transactions on Computers Vol 46 (10), October 1, 2000).

 

41.                      brogrammer n. A male programmer who eschews the stereotypical nerdy characteristics associated with programming culture.

Tech’s latest boom has generated a new, more testosterone-fueled breed of coder.

At some startups the pendulum has swung so far in the other direction that it’s given rise to a new title: brogrammer (San Francisco Chronicle, March 3, 2012).

 

42.                      brontobyte n. 2 to the power of 90 — approximately 10 to the power of 27 — bytes, or one thousand trillion terabytes.

Thinking about quantities such as zettabytes and brontobytes may seem very theoretical now, but … our need for increasing amounts of storage space has grown far more quickly than we ever thought it would. So while we will probably live to see the days when it is common to carry a petabyte in our pocket, our grandchildren and great-grand-children might one day be carrying around a bronto on their bionic implants(SmartDataCollective, February 11, 2015).

 

 

43.                      browsewrap adj. Describes a legal agreement that the user accepts indirectly by browsing an online site.

Even Cory Doctorow, the digital rights activist and online champion of all things weird, includes a lengthy legal warning at the bottom of his emails.

He uses the space to ‘require’ recipients to free him from their companies’ ‘non-negotiated agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies’  (Wired, December 27, 2010).

 

44.                      butler lie n. A lie used to politely avoid or end an email, instant messaging, or telephone conversation.

The Butler lie is a recent nomenclature coined by researchers at Cornell University. It’s a smaller lie which is conveyed electronically and used to end a conversation. The next time your friend texts that he has to end the conversation with you because the waiter arrived, just maybe your friend isn’t even at a restaurant (The Republican Herald, September 4, 2011).

 

45.                      BYOD n. The use of a personally owned mobile device, such as a laptop, smartphone, or tablet, to access a workplace network.

They were knocked aside by what the IT people called the BYOD movement, or bring your own device. People just started showing up with iPhones and said: ‘This is what we’re using. You in IT better figure out how to make them secure (Chicago Tribune, January 27, 2013).

 

 

C

 

46.                      calm technology.  Technology that remains in the background until needed and thus enables a person to interact with it in a calm, engaged manner.

Mark Weiser, a researcher in the Computer Science Lab at Xerox Palo Alto Research Center, first put forward the notion of ubiquitous computing in 1988, as information technology’s next wave after the mainframe and PC. In this new world, what Weiser called ‘calm technology’ will reside around us, interacting with users in natural ways to anticipate their needs (Electronic Engineering Times, March 31, 2003).

 

47.                      camgirl n. A girl or young woman who broadcasts live pictures of herself over the web.

In the past couple of years there has been an online explosion in the number of personal Webcam sites. More people are choosing to live in front of a camera, hooked up to the Internet via a high-speed connection. Most are girls and young women broadcasting from the most private spaces of their bedrooms, bathrooms and living rooms. These ‘camgirls’ rule the world of amateur Web sites, attracting thousands of hits daily. Some have become self-made celebrities. Some are as young as 14, but the majority are in their late teens and 20s. The sites range from the crude to the sophisticated and are so diverse it is risky to make  утя e ment d s. But most feature live cameras and/or digital still shots, links to other places on the Internet, diary entries and biographical information. 

The most controversial common feature of these worldwide cam sites is the amazon.com ‘wish list’. Camgirls encourage their fans to buy them books, CDs and other gifts via the American online company (Sydney Morning Herald, August 10, 2002).

 

48.                      canvas fingerprinting n. A technique for tracking a user online that involves drawing a hidden element on the browser canvas to create a token that uniquely identifies the user’s computer.

The mechanism, called ‘canvas fingerprinting’, uses special scripts – the coded instructions that tell your browser how to render a website ‒ to exploit the browser’s so-called ‘canvas’, a browser functionality that can be used to draw images and render text(ScienceDaily, July 22, 2014).

 

49.                      captcha n. A computer-generated test that humans can pass but computer programs cannot.

Two popular Web-based e-mail services – Yahoo! And Microsoft’s Hotmail – now employ captchas to prevent spammers from automatically signing up for hundreds of mail accounts that can then be used as spain launch pads (Technology Review Cambridge, Mass, June 1, 2003).

 

50.                      careware n. Computer software in which the only ‘price’ is to do a good deed or donate something to charity.

Instead, try Arachnophilia (www.arachnoid.com/arachnophilia). This is a nicely featured program and is ‘careware’. The author wants no money at all for his program. Instead, he asks that you ‘stop whining for an hour,  a day, a week, your choice, and you will have earned your copy of Arachnophilia’. That’s not a bad deal at all (Gannett News Service, April 1, 2002).

 

51.                      catfishing n. The elaborate fabrication of an online identity to trick a person into a romantic relationship.

Judge Jane Magnus-Stinson was unsympathetic to their claims, finding that their conduct was objectionable enough to warrant censure by the university. She specifically calls them out for ‘catfishing’ their victim (Forbes, April 26, 2013).

 

52.                      cat typing n. The random keystrokes made by a cat as it walks across a computer keyboard.

Incidentally, ‘cat typing’ is also worth a mention. It refers to the prose produced by cats walking over computer keyboards and can be used in a derogatory fashion to describe a human effort (The Herald (Glasgow), May 3, 2003)

 

53.                      celeblog n. A blog written by a celebrity; a blog devoted to a particular celebrity or to celebrity news and gossip.

Ruben Garay has announced he’s shutting down his preeminent B. Spears fan site, World of Britney (www.worldofbritney.com) because, he says on the site, the sometime crotch-baring former Mouseketeer ‘keeps losing her identity and credibility within fans and industry people’.

Garay says that, although he plans to set up a general celeblog, which will cover Brit as needed, “it’s clear I believe Britney is unfortunately done

(for me at least).” (The Philadelphia Inquirer, December 29, 2006).

 

54.                      chatterboxing  Watching a TV show while talking to other people about that program online.

Where many other types of media use might be seen to be taking viewers away, chatterboxing can actually serve to reinforce more traditional television viewing habits (The New Zealand Herald, August 29, 2013).

 

55.                      chiclet n. A small image that a website has configured to share the site’s content, particularly to social networking sites.

The chiclet overload problem is not over yet, but the solution is working its way out with these kinds of UI improvements (Informit.com, December 8, 2005).

 

56.                      chief risk officer n. A corporate executive in charge of assessing and planning for potential risks such as hacker attacks and lawsuits.

The star executive of the 1980s was the chief financial officer. Technology took over in the 1990s, elevating the chief information officer.

This decade’s hot executive is shaping up to be the CRO, the chief risk officer, which students of Intel chairman Andy Grove’s book, ‘Only the Paranoid Survive’, may recognize as the chief paranoid officer (USA Today, May 5, 2000).

 

57.                      chip v. To implant a microchip, particularly a radio frequency identification — RFID — transponder, into an animal or person. Predictions have a habit of not coming true. We don’t holiday on Saturn. Jacques Cousteau claimed in the Sixties that we would soon live underwater, using surgically created gills. We still don’t glide to work in personal, airborne pods …

But one technology is crawling towards  утя e ment — the idea of human beings being ‘chipped’, or implanted with a microchip containing personal information.

One of America’s largest medical insurance companies is sponsoring a two-year trial in which chronically ill patients will be implanted with a chip containing their medical information (The Times, July 24, 2006).

 

58.                      chip graffiti n. Artwork, initials, or some other non-functional design etched into the upper metallic layers of a silicon chip.

Moose Boy turned up on a Motorola RF integrated circuit designed for the Nokia 5190 handset. For years, chip designers tucked such tiny drawings in unused space on the prototype, the master from which others are produced. In these days of compressed production cycles, smaller circuits, overworked engineers, and more automated production, however, chip graffiti has become a dying art (Wired, November 1, 2000).

 

59.                      citizen-terminal n. A person who uses wearable technology that is always connected to a network.

Though shades of fear and bureaucratic paranoia emerge through the intonation of lines like ‘timetables and graphs/sorrows and laughs’, the choreography remains more cartoon than nightmare,  утя e m by the arrival of a miniature dancing Megatron controlled by the shape-throwing wheelchair-bound antagonist, who comes across as somewhere between a leering Hawking and a Virility-inspired ‘citizen-terminal’ (Morning Star, May 4, 2011).

 

60.                      civionics n. The use of embedded electronic sensors to monitor the health of civil structures such as bridges and buildings.

Structural Health Monitoring (SHM) is the integration of a system of sensors, model validation, system identification, monitoring strategies, data mining, data management and interpretation of the data for decision-making purposes. The term ‘civionics’ has been coined to denote the integration of civil structures with electrophotonic sensors for the purpose of determining the health of the structures (BusinessWire, March 24, 2011).

 

61.                      clicks-and-mortar adj. Describes a business model that combines online e-commerce with physical retail outlets.  

Mr Hunter said: «Next was an early adopter of the clicks and mortar strategy, integrating its store and online offerings, and the latest estimates show that sales via its Next Directory rose by over nine per cent in the latter part of last year … (The Birmingham Post, January 5, 2007); Smith believes that travel agents need to embrace the Internet in a «clicks and mortar» approach (Australasian Business Intelligence, November 28, 2003).

 

62.                      clickbait n. A web page link with text designed to entice the reader to click the link.

In last year’s feature on the Puppy Bowl, we wrote that cute — from Buzzfeed’s animal-GIF clickbait to Internet-celebrity cats and dogs — had become big business, due in part to Animal Planet taking a chance on adorable counter-programming to the Super Bowl (The Washington Post, January 29, 2014).

 

63.                      clickbaity adj. Relating to a link that has been designed, often with misleading or sensational text, to entice a person to click.

Gianotto’s day job entails managing technology for a New York City based creative agency called Noise — and that requires her to spend a lot of time on Facebook. There, she said, the clickbaity headlines just came «one after another after another», to the point where borrowing common phrases from the viral content ‘became a running joke because it was so frequent’ (The Wire, January 15, 2014). 

 

64.                      click laundering n. A technique that makes a bogus click on a online ad look like a legitimate click to defraud a pay-per-click advertising system.

Big ad networks will face challenges ensuring the legitimacy of their traffic to advertisers if click laundering becomes a pervasive trend. Should well-known websites start tapping into fraudulent clickstreams without raising suspicion, says Richard Boscovich, a senior attorney at Microsoft, ‘We’re facing a much bigger problem’    (BusinessWeek, June 6, 2010).

65.                      clickprinting n. A pattern of web surfing behavior that uniquely identifies the person doing the surfing.

By observing how people navigate around a site over a number of sessions, an e-commerce company could distinguish between two anonymous surfers. That could have important implications in preventing fraud: if someone signed in with an existing user’s logon, but their clickprint differed, that might be an indication that their ID had been stolen (The Guardian, September 28, 2006).

 

66.                      clickstream n. The virtual path a person takes while surfing the web.

Compete.com … licenses clickstream data from ISPs to find out what more than 8 million active Internet users visiting 200,000-plus sites worldwide are up to (Smart Business, November 1, 2001).

 

67.                      clicktivism n. Activism that consists solely of performing quick and simple online tasks.

The kind of mindless Internet advocacy Upworthy’s been accused of promoting has inspired a new word: clicktivism. Clicktivists mistake gratification for meaning. They conflate feeling good (or self-satisfied or inspired or righteously indignant) with doing good. They watch a video of a kid sharing his lunch with another kid, forward it to their social networks or sign a petition, congratulate themselves on their political involvement, close the browser window, and diminish the definition of service for everyone (Slate Magazine, May 23, 2014).

 

68.                      click-wrap adj. Relating to a license or contract that appears during the installation of a software program or online service and that requires the user to click a button to agree to the terms of the license.

Sometimes a contract is a mouse click away-all of the free e-mail services and commercial ISPs use ‘click-wrap’ contracts, which, similar to their counterparts for shrink-wrapped software, require users to agree to conditions before using a service. The ubiquitous I Accept button lets the service provider deny responsibility if things go wrong (Smart Business, September 1, 2000).

 

69.                      clique-stalking pp. Surreptitiously investigating a person’s friends or social media connections.

Clique-stalking can best be described as a guilty pleasure that most of us may have indulged in at some point, which may or may not be born out of curiosity (DNA India, April 27, 2015).

70.                      cloud computing n. Data storage, applications, processing, and other computing services delivered remotely via the Internet or similar network.

It starts with the premise that the data services and architecture should be on servers. We call it cloud computing — they should be in a ‘cloud’ somewhere. And that if you have the right kind of browser or the right kind of access, it doesn’t matter whether you have a PC or a Mac or a mobile phone or a BlackBerry or what have you −  or new devices still to be developed −  you can get access to the cloud (Wired, April 1, 2008).

 

71.                      coasterware n. Software so bad or useless that it never gets installed.

In the gaming world, few things exemplify corporate greed as well as poorly made expansion packs. Europa Universalis: Crown of the North falls squarely into this category. From start to finish, it is a poorly conceived, illexecuted, and time-wasting piece of coasterware designed to suck money away from both fans of the much-lauded series and unsuspecting newcomers (Computer Gaming World, November 1, 2003).

 

72.                      cobweb page n. A web page that has not been updated in a long time. Okay, okay…so I ran a teensy bit longer between updates than I planned. (If I’d gone any longer, I’d have to start calling this my cobweb page  (InfoWorld, , April 26, 2001).

 

73.                      collabulary n. A common vocabulary with which web users categorize the data they find online, particularly one created in collaboration with classification experts to ensure relevance and consistency.

 A collaborative vocabulary for tagging Web content. Like the folksonomies used on social bookmarking sites like del.icio.us, collabularies are generated by a community. But unlike folksonomies, they’re automatically vetted for consistency, extracting the wisdom of crowds from the cacophony (Wired, January 1, 2007).

 

74.                      compcierge n. A hotel employee who assists guests with computerrelated tasks and problems.

Business travelers stuck in their hotel rooms trying to connect to the Internet have a new ally ‒ the ‘compcierge’,   a computer savvy concierge (Newsday (New York), January 5, 2000).

 

75.                      compunications n. Any form of computer-based communication, including email, fax, and voice mail.

Compunication refers to ‘information exchange’ involving the use of computers, which is attracting so much attention among overburdened Hill and Executive branch staffers these days (The Washington Post, January 23, 2002)

 

76.                      computational grid n. A large collection of computers linked via the Internet.

The Geneva scientists plan to use an Internet-linked network of computers all over the world, which they are calling a computational grid (The New York Post, March 12, 2000).

 

77.                      connectivity aircraft n. A drone or similar aircraft outfitted with networking equipment that enables it to provide internet access to the area over which it flies.

The deal would give Google a major boost in its race with Facebook to connect remote parts of the world to the internet. The social network has been working with experts from NASA’s Jet Propulsion Lab and Ames Research Center to develop its own ‘connectivity aircraft’ for the purpose  (The Telegraph, June 13, 2014).

 

78.                      contactless adj. Relating to or involving technologies that allow a smart card, mobile phone, etc. To contact wirelessly to an electronic reader, typically in order to make a payment.  

Contactless payment cards that have been cancelled by consumers can still be exploited by thieves for several days, it has emerged. The “tap and

go” cards, which can be used for purchases under £30 without the need to enter a four-digit PIN or signature, do not require automatic  утя e ment d from banks (Daily Telegraph 21 December, 2015). 

 

79.                      cornea gumbo n. A web page, ad,  that is an overdesigned, jumbled, soup of colors, fonts, and images.

Folks who love splashy images and page layout may think of the oversized Inside the publishing revolution: The Adobe story as ‘eye candy’ or ‘cornea gumbo’, while those with a text-oriented bent may say that the images overwhelm the content (Technical Communication, May 1, 2004).

 

80.                      crackberry n. A BlackBerry handheld computer, particularly one used obsessively; a person who uses such a computer obsessively.

In Washington and elsewhere, the devices are referred to as ‘CrackBerries’ because of their addictive quality. Philippe Reines, a 34year-old Democrat who works on Capitol Hill (and who coined the term ‘blirting’, for BlackBerry flirting), said he went through severe withdrawal after finding that Martha’s Vineyard lacked BlackBerry reception. Mr. Reines wandered around the Vineyard for days looking for spots of coverage before begging an airline employee to take his BlackBerry on a round trip to the mainland, where it could send and receive messages. He got 129 new messages, many of them social (The New York Times, May 30, 2004).

 

81.                      craplet n. A poorly designed, aesthetically unpleasing, or just generally useless Java applet.

Unlike cable’s simple PPP connection, SBC uses SLIP-for Serial Line Internet Protocol. And the installation CD installed 125MB of spyware, craplets, and other junk to SLIP-enable my system (PC Magazine, August 23, 2005).

 

82.                      crime-as-a-service (CaaS) n. Web-based software that enables or enhances online criminal activity.

A worrying new phrase has entered the lexicon of cybercrime — Crimeas-a-Service (CaaS)…CaaS has become a well-oiled machine, built on a wide network of players that fulfill specific functions (PCQuest, March 7, 2013)

 

83.                      crimeware n. Software that facilitates identity theft, phishing, or similar criminal activity.

Pharming is another online scam, in which hackers download ‘crimeware’ to the users’ computer. That software gathers as much personal information as possible (The Evening Standard, October 9, 2006).

 

84.                      crowdfunding pp. Getting a large group of people to finance a project by using a website or other online tool to solicit funds.

David Axe … is a 30-year-old freelance war correspondent. On Saturday, he’ll be getting on a plane and flying to Chad, where refugees from the Darfur genocide in neighbouring Sudan have been streaming across the border. His reporting will wind up in a handful of major news outlets, as well as on his blog. And he’d like you to help pay for his trip.

‘As attention gets diverted elsewhere, you have to scream a little bit louder’,  he tells me from Columbia, S.C. ‘So I’m just going to go and scream’.

To get that scream out, Axe has partnered with an online news outlet called the Guerrilla News Network (guerrillanews.com) to try Web-based fundraising for his online reporting. The word for it these days is ‘crowdfunding’. He’s looking for $2,000 (U.S.) in donations to help offset the cost (The Globe and Mail, June 13, 2008).

 

85.                      crowdsensing pp. Obtaining information about an environment by accessing the sensor data generated via the smartphones and other devices used by a large number of people in that environment.

An application called MoboQ does exactly this by linking social networks with location data to let users ask time-sensitive questions about specific locations, and get them answered by complete strangers on the spot. This is crowd-sensing: a way of tapping into networks of distributed human beings (New Scientist, March 27, 2013).

 

86.                      Ctrl-Alt-Delete n. A metaphoric mechanism with which one can reset, restart, or rethink something.

It’s time to hit Ctrl-Alt-Delete on the computerized Bowl Championship Series. Or should we now call it the Bowl Split-Championship Series (Fort Worth Star Telegram, December 11, 2003).

 

87.                      Cupertino effect n. The tendency for automatic spell-checking software to replace some words with inappropriate or incorrect alternatives.

And then ‘the Cupertino effect’: typos introduced by the very ‘autocorrect’ software intended to save us from error. Ah, the typographical treason of these invisible servants!  (The Christian Science Monitor, November 10, 2011).

 

88.                      cyberbalkanization n. The division of the Internet into narrowly focused groups of like-minded individuals who dislike or have little patience for outsiders.

The Internet became the ultimate tool for finding like minds and blocking out others long before supporters of candidates began seeking one another out on Meetup.com. With online dating sites where searches can be tailored by age and income, e-mail forums for the most narrow band of subjects, bookmarked sites and even spam filters, the Web allows users to tailor the information they consume more than any other medium. Social scientists even have a term for it: cyberbalkanization. (The New York Times, January 25, 2004). 

 

89.                      cybercazing pp. Using online location-based data and services to determine when a home is unoccupied with a view to robbing.

 Data stored in digital photographs can help criminals locate individuals and plot real-world crimes, a practice two researchers called ‘cybercasing’ in a recently published paper. The site Pleaserobme.com was one of the first to expose the problem by displaying tweets tagged with location information, although it has since stopped the practice (The Atlantic, July 22, 2010).

 

90.                      cyberchondria n. unfounded escalation of concerns about common symptomology based on review of search results and literature online

Many doctors have lamented the rise of the e-health information consumer, suggesting it has led to patient ‘cyberchondria’, and anecdotal reports of patients bringing health information to their doctor abound (Australian Health Review, August 1, 2008).

 

91.                      cyberchondriac n. A person who imagines they have a particular disease because their symptoms match those listed on an Internet health site.

Cyberchondria, the deluded belief you suffer from all the diseases featured on the internet, is the latest condition to add to GPs’ workloads. In severe cases, patients armed with print-outs from wacko websites install themselves in the consulting room and begin reading aloud. Doctors have complained of being cornered into carrying out dozens of tests for obscure, nonexistent infections, because the cyberchondriac has memorised an impressive set of symptoms  (Sunday Times, April 2, 2000).

 

92.                      cyberdisinhibition n. A temporary loss of inhibition while online.

A recent study confirmed what we all suspect: The anonymity afforded by the Internet emboldens people to spread their inner creepiness. The authors of the study, published by Euro RSCG Worldwide, even coined a new term, ‘cyberdisinhibition’, to describe the phenomena (Monterey County Herald, January 24, 2010).

 

93.                      cyberflaneur n. A person who surfs the web with no purpose beyond curiosity and inquisitiveness .

Intrigued, I set out to discover what happened to the cyberflâneur. While I quickly found other contemporaneous commentators who believed that

flânerie would flourish online, the sad state of today’s Internet suggests that they couldn’t have been more wrong. Cyberflâneurs are few and far between, while the very practice of cyberflânerie seems at odds with the world of social media  (The New York Times, February 4, 2012).

 

94.                      cybergriping pp. Griping about a company and its products online, particularly by using a website created specifically for that purpose.

Addresses ending in ‘sucks.com’ have become popular for so-called cybergriping sites, where dissatisfied consumers can complain about businesses and their products and services. 

Especially popular griping sites in the United States include VerizonReallySucks.com and Walmartsucks.com  (The National Law Journal, September 4, 2000).

 

95.                      Cyber Monday The Monday after the United States Thanksgiving holiday, when people take advantage of fast Internet connections at work to purchase goods online.  

Experts cite two reasons for the Cyber Monday phenomenon: People are shopping online at work, where they have faster Internet connections, or they’re unable to finish their shopping during the Thanksgiving holiday and need a spill-over day (Chicago Sun-Times, November 21, 2005).

 

96.                      cyberpark n. A large area of land where computer and technology companies are concentrated, or that has been constructed with a high-tech communications infrastructure; a theme park where the theme has some relation to computers or the Internet.

A senior government official, B.V. Naidu, said on Friday that the

Department of Electronics’ Software Technology Parks of India will set up a ‘cyberpark’ to promote the growth of small and medium enterprises. ‘The cyberpark will help hundreds of small and medium businesses make use of state-of-the-art communications and other facilities for developing software,’ Mr. Naidu said (Journal of Commerce, April 7, 2000).

 

97. cyberpiracy n. The purchase of an Internet domain name that includes a company’s registered trademark name, with the intention of selling the domain name to the company.

A big company doesn’t want to find out a 12-year-old kid has already registered its name,’Ms. Bailey says. This was pretty much the case for Apple Computer Inc. When it discovered 16-year-old Calgary student Abdul Traya held title for the domain name appleimac.com, which he registered two months after Apple announced the iMac computer launch. Mr. Traya received a letter from Apple’s lawyer saying he committed an act of blatant cyberpiracy (The National Post, June 21, 1999).

 

98.                      cyberscriber n. A person who publishes something online.

Budding bards can wax lyrical in the Youth Poetry Slam, while cyberscribers can learn top tips in a Blogging Your Way To Success session (The Guardian, March 3, 2012).

 

99.                      cybershop n. Purchase or shop for goods and services on a website.

You can find the locations for cybershops full of books, software, flowers, CD-ROMs, computers and other products by trying http://fgopherpeg.cwis.uci.edu. (E-Commerce, July 2001).

 

100.                 cybershopper  n.  оne who shops by means of computers or the

Internet.

CyberShopper, an online and mobile marketing platform for small businesses is establishing itself in some initial markets. Their strategy to partner with newspapers is turning out to be a winning formula for both the newspapers and Cybershopper. John Feuling, сybershopper, reported these recent developments in an email to Tekyz, Inc. In which he also added  ‘In fact, I believe it’s been described as ‘astonishment’. That’s what we were a fter, so thanks for doing an incredible job’. You can learn more about

CyberShopper at www.cybershopper.org. (The Sunday People, March 2,

2014).   

 

101.                 cybershopping n.  Shopping for goods and services on the Internet.

If you’re not online, you’re missing out on a whole lot of fun in the fab world of cybershopping (Daily Record, January 20, 2001); The enthusiasm with which New Zealanders have taken to cybershopping certainly has implications for our retailers, who must charge the GST and pay the import duties that online retailers avoid (The Herald on Sunday, August 7, 2011).

 

102.                 cyber-shot n. Sony’s line of point-and-shoot digital cameras.  

Cyber-shot names use a DSC prefix, which is an initialism for ‘Digital Still Camera’. Many Cyber-shot models feature Carl Zeiss trademarked lenses, while others use Sony G lenses. All Cyber-shot cameras accept Sony’s proprietary Memory Stick or Memory Stick PRO Duo flash memory. Select models have also supported CompactFlash. Current Cyber-shot cameras support Memory Stick PRO Duo, SD, and SDHC.

From 2006 to 2009, Sony Ericsson used the cyber-shot brand in a line of mobile phones (Retrieved May 8, 2013).

 

103.                 cybersquatting pp. The practice of obtaining and holding an

Internet domain name that uses a company’s registered trademark name.

For some, procuring a domain name and selling it to the highest bidder became a sport and a lucrative gamble. For others, it was a way to protect a valuable resource.

However, not all domain name conflicts arose from these acts, known as ‘cybersquatting(Sydney Morning Herald, April 29, 1997).  

 

104.                 cybervigilantism n. The exposure or punishment of online lawbreakers by individuals not connected with the police or other legal authorities.

Self-appointed sheriffs scan eBay and Yahoo auctions looking for fraud. When they find it —‒  or at least when they think they’ve found it ‒ they warn buyers or make outrageously high bids themselves in order to end the auction and prevent potential victims from falling into the trap. Elsewhere, private crusaders cruise Internet chat rooms for pedophiles and report their findings to law enforcement ‒  or even expose them online. And hackers release programs into cyberspace that repair the damage done by malicious computer viruses. …

Just as in the real world, cybervigilantism doesn’t always work out for the best. Executives at eBay argue that vigilantes ‒  well intentioned as they might be ‒ can wrongly disrupt legitimate deals  (The New York Times, March 28, 2004).

 

105.                 cybrarian n. A librarian who specializes in locating, prioritizing, and organizing information on the internet.

About a third of the library graduate programs in the United States have now ditched the word library. Not that librarians, as a rule, have begun identifying themselves as information scientists or, for that matter, cybrarians – I use this last word to conjure up the new breed of tech-savvy librarians, part cyborg, part cat’s-eye reading glasses  (Harper, February 2, 2010).

 

106.                 cyburban myth  A mainstream media story about the Internet that has little or no basis in fact.

We may note that many of the newly appearing ‘virtual concepts’ have undergone certain myhtologization, having been classed by collective ‘virtual’ mind as cyburban myths (this word combination was formed by blending the preexistent notion ‘urban myth’ with the productive ‘virtual’ affix cyber-, which fact denotes the interdependence of the VIRTUAL REALITY existence and the urban, end-of-the-century civilization) (Rusudan Makhachashvili, ‘Linguophilosophic Parameters of English Innovations in Technosphere’, Cambridge Scholars Publishing, July 17, 2013).

 

107.                 crowd mining Extracting useful knowledge from large databases of social information.

If L.A. Fashion Week’s eco-friendly green clothing lines have taught us anything, it’s that we shouldn’t ignore the collective power of the crowd. This insight has long been the cornerstone of business plans that depend on ‘fractional ownership’, but with consumers facing seemingly insurmountable problems like a crappy economy and a crap-filled environment, marketers are finding new opportunities for mixing it up with the masses. By augmenting consumers’ natural inclinations toward collaboration with advances in online and wireless technologies, a number of ‘why didn’t I think of that’ startups have struck it big by mining for opportunities in crowds (‘Crowd Mining’, The Global Marketer, March 21, 2009).

 

 

D

                                   

108.                 data exhaust n. The digitally trackable or storable actions, choices, and preferences that people generate as they go about their daily lives.

Some firms will make a living based entirely on mining ‘data exhaust’, the bits and bytes produced by other activities. One example is Google’s PowerMeter, which not only lets users check their use of electricity online but gives Google access to lots of data to analyse and, not least, sell advertisements against (The Economist, November 4, 2010).

 

109.                 data fast  The act of turning off your computer and other electronic equipment for an extended period of time.

Go on what David Shenk calls ‘data fasts’. Take a week in the country away from all the noise to clear your head. Take a big novel with you, preferably by an austere Russian from the 19th century (Sunday Herald Sun (Melbourne, Australia), April 23, 2000).

 

110.                 data fracking  Using enhanced or hidden measures to extract or obtain data.

The Therapeutics Initiative’s Colin Dormuth is a Victoria researcher who already uses this information to study drug safety. After my article came out last month, he tweeted that allowing for-profit companies to mine our health data amounts to ‘data fracking (Common Ground, October 1, 2014).

 

111.                 data furnace n. A computer installed in a home or office to be used as both a server and the building’s primary heat source.

Instead of fighting the heat they want to create data furnaces which will use the heat to heat homes and businesses. Their idea is to sell fully enclosed data furnaces much like a regular furnace. The data furnace would physically fit into a basement or closet and integrate into an existing duct system to distribute heat. Additionally, the data furnace would be connected to the Internet and be secured from tampering (Windows Networking, September 8, 2011).

 

112.                 data journalism n. Journalism that uses statistics, programming, and other digital data and tools to produce or shape news stories.

Nate Silver relaunched his data-driven blog, FiveThirtyEight, this week under the auspices of ESPN as a full-blown data journalism site covering sports, politics, economics, science, and culture with a masthead of about 20. Silver introduced the new site with a manifesto for his style of data journalism, outlining a four-step process of collection, organization, explanation, and generalization and critiquing traditional journalism for its poor job of approaching anecdotes and data, particularly on the latter two steps (Nieman Journalism Lab, March 21, 2014).

 

113.                 data hygiene Principles and practices that serve to maintain accuracy in computer data.

Data hygiene — the art of keeping a direct mail database clean and upto-date — could prove to be the most irritating new buzzword of 2001. But it could be key to the success of direct mail printers (Printing World, January 8, 2001).

 

114.                 data lake n. A massive amount of data stored and readily accessible in its pure, unprocessed state.

To prepare for this onslaught, some IT leaders are urging the creation of ‘data lakes’ These are centralized repositories based on Hadoop that draw raw data from source systems and then pass them to downstream facilities for utilization by the knowledge workforce (Forbes, May 29, 2015).

 

115.                 data shadow n. The trackable data that a person creates by using technologies such as credit cards, cell phones, and the Internet.

It’s not only spam that worries Garfinkel. It’s the power that businesses wield with personal information. Take the case of a Los Angeles man who injured his leg in a supermarket; when he sued, the market used records of his alcohol purchases to malign his character. Our ‘data shadows’ ‒ a term coined by Columbia professor Alan Westin ‒ ‘force us to live up to a new standard of accountability,’ Garfinkel writes(The Industry Standard, February 21, 2000).

 

116.                 data spill n. The accidental transmission or display of private online data to a third-party.

Unintentional disclosures of personal information, called ‘data spills,’ can occur when visitors click on a link to an external site. Browsers automatically notify the new site of the URL (internet address) from which the user has just come, possibly disclosing private information. For example, the URL could contain a name or e-mail address, or it could communicate confidential information about personal interests (e.g., www.medicalsite.com/baldness)  (Security Management, May 1, 2001).

 

117.                 darknet n. The collection of networks and other technologies that enable people to illegally share copyrighted digital files with little or no fear of detection.

Here is a prediction: the darknet will never die. Adversaries will send out their digital agents to hunt down its disciples. But the darknet will go further underground, finding new ways to escape the reach of these electronic attackers. The faithful will find safety by banding together in small groups, beyond the reach of the oppressors.

The script for the next Matrix sequel? No — because the darknet is already here: it is the unofficial side of the Internet. And its resilience guarantees that it will remain a thorn in the side of the music and movie industries, whatever successes they may have in crushing its early manifestations (Financial Times (London), July 29, 2003).

 

118.                 Dark Web n. The part of the World Wide Web that is only accessible by means of special software, allowing users and website operators to remain anonymous or untraceable.  

A new light was cast on the Dark Web when it surfaced in recent news reports that it was used by hackers to spread personal information — names, email addresses and sexual fantasies — of members of the adultery website Ashley Madison (New York Daily News, December 3, 2016).

 

119.                 dataveillance n. The ability to monitor a person’s activities by studying the data trail created by actions such as credit card purchases, cell phone calls, and Internet use.

Many Canadians don’t realize how extensive electronic surveillance has become in the past 20 years. There are safeguards and penalties for abuse in government, but information exists in countless private-sector databases, often unsecured ones. … That’s why Big Brother is less a concern, critics say, than the thousands of profit-motivated Little Brothers already in our midst. People who do [not] understand about ‘dataveillance’ are often lulled by empty promises of confidentiality, especially online ( The Toronto Star, August 12, 2000).

 

120.                 death tweet n. A death threat written as a Twitter update.

Vermont comedian Chris King was arrested Oct. 8 for tweeting: ‘I am dying inside. And I am plainly stating to you that I am going to kill the president’. Such ‘death tweets’ on the social media network Twitter have figured in several high-profile threat arrests (The Christian Science Monitor, November 26, 2010).

 

121.                 defriend v. To remove a person from one’s list of friends on a social networking site.

After Jerome Kerviel lost his employer, French investment bank Societe Generale, $7.2 billion, he also lost 7 of his 11 friends on Facebook. Smart move (MVE) by those ex-friends. You never know who’s looking at your profile. Of course, at some point, you might be in a similar situation. Because this kind of thing happens all the time. So here’s how to defriend that guy who just went into hiding after losing $7.2 billion (ValleyWag, January 29, 2008).

 

122.                 device-agnostic adj. Of, or relating to, a software program or other system that is not dedicated to a single hardware platform, but instead is flexible enough to work with any device.

What we really provide is a device-agnostic, protocol-agnostic and carrier-agnostic access to any wireless device (RCR Radio Communications Report, January 31, 2000).

 

123.                 dial tone n. A metaphor for any service that provides easy, universal access to some other product or service using a variety of devices and regardless of location.

The amount of Internet content will grow ‘tenfold’ over next 3 years, IBM Vp-Global Media Mktg. Steven Canepa said, and much of growth will be in streaming audio and video. He said content would be available to ‘pervasive devices,’ starting with Palm units and Web-enabled phones, and extending eventually into even more exotic devices. Successful services will provide ‘content dial tone,’ Canepa said, offering ‘whatever you want, where you want it, and using the device you want to use’ (Communications Daily, April 13, April 13, 2000).

 

124.                 diarrheaist n. A person who shares too much online, particularly personal information.

Dan, I was thinking ‘The Wine Diarrheaist’, unless that impinges upon Mike’s intellectual property rights (Wine Diarist, June 12, 2011).

 

125.                 digifeiter n. A counterfeiter who uses digital technology to create forged money or documents.

The new Dollars 20 bill (due in autumn) is said to have ‘subtle green and peach toning and dynamic tilt-tinting’ that will make digifeiters and Laurence Llewelyn-Bowen weep (The Observer, June 15, 2003).

 

126.                 digilante n. A person who uses digital tools and techniques to avenge a crime.

I certainly wouldn’t diminish those with real talent and ability by calling myself a hacker; I was a cyberdouche at best. I say this only to illustrate that I know where the self-professed digilantes of our day—the kids who spam your chat rooms, flood your Minecraft worlds, and cripple your web servers for sport—are coming from(Wired, April 26, 2011).

 

127.                 digital crowding  Excessive, unmanageable, or unavoidable online social contact.

With all the focus on the legal aspects of privacy and the impact on global trade there’s been little discussion of why you want privacy and why it’s intrinsically important to you as an individual’, said Adam Joinson, professor of behavior change at the University of the West of England in Bristol, who coined the term ‘digital crowding’ to describe excessive social contact and loss of personal space online(The New York Times, October 6, 2014).

 

128.                 digital detox Time spent away from computers and other digital devices.

I’ve chosen this somewhat humourless way of celebrating to road-test the latest travel fad: the digital detox. In this age of information overload, holidaymakers increasingly  утя e a break from the treadmill of technological lives filled with 24/7 notifications and spam  (The Guardian (London), January 18, 2015).

 

 

129.                 digital dualism The belief that online and offline are largely distinct and independent realities.

As someone who runs social media workshops in universities, I’ve become ever more convinced that many of the confusions which surround digital activity stem from a basic ontological misunderstanding of what online activity is. It’s too frequently construed as something distinct from the ‘real’ world.

The reasons for this distinction, which has pithily been named digital dualism, are a fascinating question in their own right (The Sociological Imagination, June 29, 2012).

 

130.                 digital hangover Feelings of shame and regret caused by social network photos and other online evidence of one’s embarrassing behavior.

The drinkers admitted waking up to find friends had uploading videos and pictures of their drunken  утя e m. And 16 per cent recalled asking friends to take down the offending material — for fear their families or employers might see.

The phenomenon ‒ dubbed a ‘digital hangover’ ‒ has increased thanks to the popularity of Facebook, Twitter and the spread of camera phones (Mail Online, July 15, 2013).

 

131.                 digital literacy  The knowledge, skills, and behaviors used in a broad range of digital devices such as smartphones, tablets, laptops and desktop PCs, all of which are seen as network rather than computing devices

SOUTH KINGSTOWN – The U.S. Department of Education has recognized the University of Rhode Island’s digital literacy graduate certificate program as a model in teacher education.

U.S. DOE’s Office of Educational Technology singled out the program created by URI professors in the 2016 National Education Technology Plan. The plan calls on educators to ensure fair access to learning through technology and urges schools to redesign teacher preparation programs by using technology throughout teacher preparation (Providence Business News, December 22, 2015).

 

132.                 digital native  A person who grew up in a world with computers, mobile phones, and other digital devices.

This was how I ended up signing up for a free account from Twitter, a group-messaging application that despite all the media attention it has received still hasn’t broken into the mainstream or become a to-die-for tool for the youngest early adopters. While some tech-savvy adherents use Twitter to “micro-blog” from cellphones and BlackBerrys, as well as from computers, other digital natives like my teenage daughters and their friends have remained oblivious to its charms (The New York Times, February 14, 2008).

 

133.                 digital nomad A person who uses technology, particularly wireless networking, to work without requiring an office or other fixed address. But there’s a growing awareness, buttressed by new research, that working remotely is a more nuanced affair. Some people are simply not wired for the life of the digital nomad. What is to some a broadband paradise is to others an exercise in alienation. ‘If I work at home for more than two days, I feel a bit isolated’, says Cisco Systems European Marketing Manager Tim Stone. ‘I tend to go to the office a couple of days a week just to have human interaction’ (Business Week, July 27, 2009).

 

134.                 digital pathogen n. A computer virus, worm, Trojan horse or other software that causes harm to computers, electronic devices, or networks.

Digital pathogens spread so quickly, however, that even the most diligent patchers could be at risk. At a security symposium last August, Mr. Staniford and two co-authors presented ‘How to Own the Internet in Your Spare Time’, which described a computer simulation of a worm attack. The worm in the simulation attacked machines that had been selected earlier as ripe targets, instead of randomly probing the Internet. The simulation found that within 15 minutes, the worm would have infected more than nine million machines. Mr. Staniford called it the Warhol worm, a nod to Andy Warhol’s famous line about fame (The New York Times, September 7, 2003).

 

135.                 digital pickpocketing n. The theft of data from a mobile device, particularly one that contains a radio frequency identification (RFID) chip for transmitting information wirelessly.

Stuck on the tarmac, flipping through a travel magazine, you’re struck by the blurb for metal-lined wallets. Purpose: to prevent digital pickpocketing by blocking radio frequencies  (BBC News, December 17, 2014).

136.                 digital tattoo  The difficult-to-remove digital imprint that a person creates by posting information online and by accessing online resources.

Giving a child any device with an Internet connection requires oversight. A sudden wave of adolescent emotion could generate a photo or a social media message that could become what Gail Lovely, a former teacher and owner of Lovely Learning, a consulting firm for schools, refers to as a ‘digital tattoo” that comes up in a job interview 10 years later (The New York Times, August 28, 2013).

 

137.                 disconnectionist n. A person who advocates spending time away from online activities, particularly for mental or spiritual rejuvenation.

Why has silence become a commodity? To some extent it seems an outgrowth of a back-to-basics, purity-as-priority impulse. Food can’t get from the farm to the table fast enough; toxins must be avoided at all costs; the ‘disconnectionists’ preach digital detox ( New Republic, March 4, 2014).

 

138.                 disk spamming pp. Flooding the market with a company’s computer disks in an effort to get as many people as possible to install the software or subscribe to the service.

AOL marketers are planning to spend $ 127 million to promote 4.0 for the quarter ending Dec. 31. They claim to have developed a more efficient method of targeting potential customers, instead of ‘disk spamming’  the population (The Dallas Morning News, November 17, 2003).  

 

139.                 diss tweet n. A disrespectful or insulting Twitter post.

Despite social media opening communication channels, as well as making bands themselves directly accessible – often to their detriment, as they reveal the depths of their dimness in ill-considered diss tweets – the culture of boyband fans hasn’t really changed much since the days of Beatlemania (The Guardian (London), August 24, 2015).  

 

140.                 dog-food v. To use a product, particularly a software program, that was created by you or your company, particularly while the product is still in the testing stages.

That’s to its credit if it wants to attract an audience like the characters it depicts, but, really, beneath lines like ‘we have to dog-food our hardware’ … and ‘I don’t crowdsource my clothes’, ‘Betas’ is Amazon’s bigger bangier theory, right down to the socially challenged Indian nerd whose parents want to marry him off so they can have grandchildren (The San Francisco Chronicle (California), November 20, 2013).

141.                 domainer n. A person who makes a living from domain name speculation or by purchasing popular domain names and filling the sites with advertising.

          A    single    good    domain    name    —    Candy.com,    Cellphones.com,

Athletesfoot.com — can bring in hundreds of dollars a day, in some cases while the owner hardly lifts a finger. Schwartz, for instance, directs his traffic to one of the many small companies that serve as go-betweens with Google and Yahoo, the two giants that make this all possible. The middlemen, known as aggregators, do all the heavy lifting, designing the sites and tapping into one or the other of the search engines’ advertising networks to add the bestpaying links. Many other big domainers cut out the middlemen, creating their own webpages and working directly with Google or Yahoo (Business 2.0, November 18, 2005).

 

142.                 doorway scam n. A scam in which a web page is a set up with content that places the page high on a search engine’s results, but that when visited will redirect the user to a different, usually pornographic, site.

The same is true for the trick known as ‘doorway scams’ This method involves constructing the site so that the content will appear high on the search results. For example, a search on “livestock” may result in a “hit” list with a porn site on bestiality(McFarland, May 8, 2007)

 

143.                 doorknob rattling n. Probing a computer that is connected to the Internet to see if it has any vulnerabilities that can be exploited.

On April 29, system administrators detected a ‘doorknob rattling incident’ in which an interloper unsuccessfully tried to enter and retrieve account information from Chretien’s Web server, the latest in a string of occurrences detailed in the records (Calgary Herald (Alberta, Canada), December 3, 2000)

 

143.                 dotcom (dot-com, dot.com) n. A company that runs its business on and derives its revenues from the Internet. 

The dot.com mania is back. The $315m agreement that saw AOL buy the Huffington Post earlier this week was just the latest in a string of deals with prices that bear no relation to reality (The Independent, February 11, 2011); That surge evoked memories of the early stages of the dot-com boom in the 1990s (New Zealand Herald, June 4, 2011). 

 

144.                 dot con artist n. A person who runs an Internet-based scam or fraud.

This collaboration with law enforcement agencies, industry and consumers will create a climate where e-commerce can be conducted with confidence, said the FTC’s Bernstein. ‘We want the dot con artists to know that we’re building a consumer protection coalition that spans the globe’ ( Sun-Sentinel, November 1, 2000).

 

 

145.                 drailing, p composing and sending an  утя e ment  email message while inebriated.

A male friend of mine in Victoria enjoys passionate “drailing” (emailing when drunk) with a girl he’s only ever got er, fleshy with in the organic world once (Hobart Mercury, May 11, 2005).  

 

146.   dronie n. A video self-portrait taken by a self-controlled drone.

Bad news, Instagramers: The selfie is officially played out thanks to an entrepreneur in San Francisco who has just raised the bar for ego-inflating, self-photography. Behold: The ‘dronie’ is upon us. (The Daily Mail, April 17, 2014).

 

147.   drop-dial v. To drop a user’s existing Internet connection and then dial up a new connection that offers a service, such as a video or concert over a premium-rate phone line.

Drop dial is a technique used by both scrupulous (Comic Relief) and unscrupulous (porn) websites to get money from Net users without requiring a credit card. A program on the website drops the user’s internet connection and dials a new one, usually on a premium rate number (The Daily Telegraph, April 5, 2001)

 

148.   DWT n. Driving a car while reading or sending text messages.

Nebraska is on the low end for text messaging. Nationally, 28 percent of the survey respondents admitted to driving while texting, based on the survey commissioned by vlingo Corp., which sells software it says will translate voice to text on a cell phone.

In fact, the practice has become so common that state legislatures have begun making it a traffic violation with its own acronym ‒DWT (driving while texting)…

About 52 percent of respondents 20 to 29 years old report they text while behind the wheel, and 50 percent of teenagers admit to DWT, according to the vlingo survey (Lincoln Journal Star, June 5, 2008).

 

 

E

 

149. eavesread v. To surreptitiously read the text that another person is reading or writing.

A less intimidating/eye-contact-y way of discovering your OTP than those

36 infamous questions. Eleanor and Park’s epic love story begins when Eleanor peeks over Park’s shoulder on the bus to school to ‘eavesread’ his comics(Bustle, February 17, 2015).

 

150.                 e-book n.  a book-publication in digital form, consisting of text, images, or both, readable on computers or other electronic devices.

 The library’s second venture into the e-book field will be to make titles available for download (Waikato Times; August 6, 2011).

 

151.                 e-business n.The conduct of business over the Internet, including buying, selling, communicating, and accessing information; an Internet-based business.

‘A transaction should be accounted for the same, whether it’s an ebusiness or a brick-and-mortar business’, Scott Taub, an aide to Mr. Turner, said in an interview (The New York Times, March 29, 2000).

 

152.                 e-cigarette n. An electronic device that heats a nicotine-laced liquid into an inhalable vapor.

Last summer, the FDA said it found a chemical used in antifreeze and other toxic chemicals in a small sample of e-cigarettes the agency analyzed. The FDA tried to block imported e-cigarettes, but a Washington, D.C., court ruled that FDA can’t regulate the products. In its appeal, the FDA argues ecigarettes should be considered the same as gum and patches that help smokers try to quit (Chicago Tribune, April 3, 2010).

 

153.                 e-cruitment n. Online employee recruitment, including the electronic submission of résumés and online interviews with job applicants.

Internet recruitment companies are preparing their own code of conduct this week after reports of cowboy operators abusing the system. Unscrupulous agencies are reported to have started creating false vacancies and begun exaggerating pay and package claims. This is illegal in newsprint, but has yet to be challenged in relation to the internet. Legitimate ecruitment companies will eventually have to sign up to the new code (Daily Mail, March 14, 2000).

 

154.                 e-cycling n. The process of recycling the components or metals contained in used or discarded electronic equipment.

The Midshore Region’s Fall 2006 Household Hazardous Waste and mercury thermometer collection will take place from 8 a.m. to 2 p.m. Nov. 4 at the Midshore Regional Landfill in Easton. The region’s electronics recycling  (‘e-cycling’) collection will also occur at the same time.

E-cycling is a relatively new recycling option for televisions, computers and computer accessories being tested by the Midshore Counties. The accepted materials have been expanded to include VCRs, CD players, calculators, cell phones, radios, stereos, CB radios, fax machines and answering machines (The Capital, October 27, 2006).

 

155.                 edupunk n. An education reform movement that eschews traditional teaching tools in favor of Internet-based learning and other high-tech methods.

The troubled economy and changing technology have already fueled a do-it-yourself education reform movement dubbed ‘edupunk’, which envisions virtual campuses and lower-cost or even free instruction. The edupunks are picking up where traditional institutions left off (The Village Voice, July 27, 2010).

 

156.                 e-fence v. To sell stolen goods on the Internet, particularly using an online auction site such as eBay.

Brekke launched Target’s crime laboratories, five years ago, with the intention of fighting the “brick and mortar” storefront fences and warehouse repackaging operations that King Rogers had helped to uncover. But since then, Brekke says, the labs have increasingly been used to fight ‘e-fencing’, the resale of stolen goods online through eBay, Craigslist, and other ecommerce sites, where thieves can operate with virtual anonymity (The New Yorker, September 1, 2008).

 

157.                 egosurfing pp. using a search engine to locate and read pages, posts, articles, and other online content that mentions your name.  

Are you curious to see where your name appears online? If so, you might have tried asking your favourite search engine where your name appears.

There is a term for this — it’s called ‘egosurfing(New Straits Times, October 18, 2000).

 

158.                 e-mail apnea n. The unconscious and temporary suspension of regular breathing while checking and reading email.

Researchers say that the stress of not being able to process information as fast as it arrives, combined with the personal and social expectation that, say, you will answer every e-mail message, can deplete and demoralize you. … Author Linda Stone, who coined the term ‘continuous partial attention’ to describe the mental state of today’s knowledge workers, says she’s now noticing, get this, ‘e-mail apnea’: the unconscious suspension of regular and steady breathing when people tackle their e-mail (Harvard Business Review, September 1, 2009).

 

159.                 e-mail bankruptcy n. The state of being unable or unwilling to read and respond to all the email messages one has received, and so to delete those messages and start over again.

Last month, venture capitalist Fred Wilson drew a lot of attention on the Internet when he declared a 21st century kind of bankruptcy. In a posting on his blog about technology, Wilson announced he was giving up on responding to all the e-mail piled up in his inbox.

‘I am so far behind on e-mail that I am declaring bankruptcy,’ he wrote. ‘If you’ve sent me an e-mail (and you aren’t my wife, partner, or colleague), you might want to send it again. I am starting over.’ …

The term ‘e-mail bankruptcy’ may have been coined as early as 1999 by a Massachusetts Institute of Technology professor who studies the relationship between people and technology.

Professor Sherry Turkle said she came up with the concept after researching e-mail and discovering that some people harbor fantasies about escaping their e-mail burden. (The Washington Post, May 25, 2007).

 

160.                 e-mail fatigue n. Mental exhaustion caused by receiving a large number of email messages each day.

Getting your emails past an ISP’s deliverability standards alone is a significant barrier.  Getting your emails opened and links clicked is an entirely different barrier.  Like many of you, I am subscribed to a boat load of daily deal sites and it is almost impossible to check them all out.  Email fatigue threatens every deal business.  Due to the high volume of emails that deal sites send and the amount of emails that folks receive, overcoming email fatigue and achieving higher response rates from your emails is incredibly important. (Founder, May 16, 2012).

 

161.                 empathy game n. A video game genre that uses intense, personal stories to create an emotional connection with the player.

‘That Dragon, Cancer’ is part of an emerging trend of game developers beginning to produce so-called ‘empathy games’ — smaller, more intimately focused video games that attempt to portray realistically a particular aspect of the human experience (NBC News, August 20, 2013).

 

 

 

162.                 e-mail hygiene n. Principles or practices that reduce spam and protect a computer from viruses and other threats embedded in or attached to email messages.

Messaging administrators have greater choices to protect the network perimeter at a time when constant threats are the norm.

Once upon a time, IT departments had to worry about viruses while protecting the perimeters of their networks, but over the years, threats have changed as have the ways that IT is asked to deal with them. 

Matt Cain, a senior vice president at Stamford, Conn.-based Meta Group, recently reviewed 12 products on the market, that help enterprises with ‘email hygiene’ ‒ what it takes to protect a network at its perimeter (Wired, February 22, 2011).

 

163.                 e-mentor n. A counselor who provides help and advice to a younger or less-experienced person via the Internet.

Back in the UK, the shortage of talented electronics engineers in the UK has persuaded GEC to appoint ‘e-mentors’ from within the company to guide talented prospective employees through the course of their university careers (The Guardian (London), April 1, 2000).

 

164.                 emojis  n. A pictograph:, officially called the ‘Face with Tears of Joy’, a small digital image or icon used to express an idea or emotion in electronic communication’; the term emoji is a loanword from Japanese, and comes from e ‘picture’ +moji ‘letter, character’.  

With Oxford Dictionaries crowning ‘emoji’ – specifically, the tears of joy emoji – as the word of the year, it was  a given that we’d compile a best emoji list for 2015.(The Hindu, February 2, 2016).

 

165.                 Emojipedia n. the emoji search engine; a fast emoji search experience with options to browse every emojy by name, category , or platform   

Emojipedia reported on Thursday that new emojis will be coming to some Android phones next week — but The Huffington Post noticed that some updates have already hit Google Hangouts, the messaging program you probably use to talk to your friends in Gmail (The Huffingtomn Post, December 3, 2016).  

 

166.                 emotags n. Mock HTML tags used in writing to indicate an emotional state.

 Short for ‘emotion tags’, emotags are fake HTML tags put in e-mail messages to make the writer’s tone of voice clear (The Daily Telegraph, November 1, 2001).

 

167.                 empty spam n. A spam message that contains passages from classic literature, but no discernible advertisement, phishing attempt, or malicious code.

But throughout last spring and summer, many e-mail users reported that their literary spam was arriving without any attachments or sales pitches; it was just text, harmless and sometimes fascinating. Bloggers and even the Jargon Watch column in Wired magazine, which termed the phenomenon

empty spam’, seemed charmed by it (The New York Times, December 10, 2006).

 

168.                 e-nose n. A device containing electronic sensors that can detect chemicals associated with particular smells.

Breathalysing for cannabis and detecting bombs are just two uses

Australian scientists see for a range of electronic noses ‒ or e-nose ‒ they are developing (The Australian, August 30, 1999).

 

169.                 ephemeral sharing  Sharing a photo, file, or other content electronically, but allowing the recipient to view it for only a limited time.

While photo documentation used to connote some level of importance, the ubiquitousness of Facebook and the popularity of documenting the mundane has created a situation where deciding not to document something tends to give it more meaning. As a result, the ephemeral sharing of a moment on Snapchat begins to release users from the tensions caused by ‘hyper documentation’ (The San Francisco Chronicle, August 11, 2013).

 

170.                 e-print n. An electronic pre-print of a scientific article.

To spread their words faster, scientists have traditionally sent out preprints of unpublished articles and, with  the advent of the Internet, ‘e-prints’ have now emerged  (The Economist, January 24, 2000).

 

171.                 e-textile n. A textile that has electronic circuitry woven into the fabric.

The rainbow-striped swatch of cotton in Mark Jones’ and Tom Martin’s lab at Virginia Tech would spice up any college dormitory as a nice throw rug. But peer closer between the purple, green and orange weaving and it’s apparent why their students aren’t grabbing at it for decoration.

 There are wires and sensors in there, connected by thin strips of steel.

With small processors connected every few yards, the cloth is actually an extremely flexible, wearable computer. ‘I can wrap it like this … and it will still work’, Martin said, twisting the fabric around his torso like a beach towel. 

Jones’ and Martin’s ‘eTextile’,  which is being developed with the University of Southern California, is a prototype of a new breed of fabric that is woven not only for looks, but for computing power… (The Associated Press, November 27, 2002).

 

172.                 ethical hacker  A computer hacker who attempts to infiltrate a secure computer system in an effort to learn the system’s weaknesses so that they can be repaired.

But there’s another breed of hacker out there, one who works at foiling the efforts of the troublemakers. Unlike      the hackers who attempt to break into corporate networks for sport and spying purposes, so-called ethical hackers typically hire themselves out to perform ‘vulnerability assessments’ for clients — meaning they essentially break into the client’s computer network with the client’s consent in the interest of patching up security holes… 

Companies ranging in size from startups to International Business Machines Corp. have ethical-hacking teams. Computer-security services, including vulnerability assessments by ethical hackers and other services, was a $1.8-billion (U.S.) worldwide market last year, and is expected to grow at a compound annual rate of 28 per cent for the next three years, according to Gartner Inc., a market research firm in Stamford, Conn (The Wall Street Journal, March 11, 2002).

 

173.                 e-thrombosis n. The formation of blood clots caused by sitting at a computer for prolonged periods.

Office workers risk being struck down by deep vein thrombosis if they sit at their computer screens for long periods without a break, health experts said yesterday. The warning came as it emerged that a computer programmer from Bristol almost died after a 12-hour stint in front of his screen in what is believed to be one of the first cases in the UK of a growing phenomenon dubbed e-thrombosis(The Guardian, May 9, 2006).

 

174.                 Evernet n. Internet access that is instantly and always available from a number of different devices.

The instant, infinite internet — whose working title is the ‘evernet’ — will eliminate many of the internet’s biggest turn-offs at a stroke, rendering oncegrainy movies at cinema quality and music to rival the sounds of a concert hall (Guardian Weekly, December 27, 2000).

 

175.                 e-wallet n. A computer database or online site that stores a person’s name, address, and credit card data and then enables easy retrieval of that information for online purchases.

According to Jupiter Communications, 27 percent of consumers abandon the items they put into a online shopping basket because they find filling out the forms too exasperating. 

The e-wallet is designed to make online shopping more convenient by allowing consumers to store all their credit card and shipping information in a single spot (The San Francisco Chronicle, October 11, 2000).

 

176.                 e-waste n. Discarded computers, monitors, and other electronic equipment.

Residents can drop off broken computers and other electronic junk at University of Hawai’i campuses today as part of a new effort to make sure such ‘e-waste’ is recycled in environmentally friendly ways. 

Broken computers often include components that can be reused, and also contain small amounts of copper, gold and other metals that can be extracted and recycled, said Larry Wiss of UH Information Technology Services.

‘We’ve received numerous calls from people who know about piles of ewaste just sitting outside buildings where children are just playing around them, and they’re filled with lead and bromide and different kinds of chemicals’, he said. ‘So this is a chance to get that kind of waste off the islands to be recycled in an earth-friendly fashion’ (The Honolulu Advertiser, October 28, 2006).

 

177.                 exergaming n. An activity that combines exercise with video game play.

The origins of exergaming can be traced back to 1989, when Nintendo released two accessories for its Nintendo Entertainment System. The Power Pad was a large plastic platform that plugged into the console and contained 12 pressure sensors on which gamers could step or jump to play sports games such as ‘World Class Track Meet’. The Power Glove was a glove-like controller that translated various gestures into on-screen movements …

A study by researchers at the Mayo Clinic in Rochester, Minnesota, published in the journal Pediatrics in December, found that exergaming more than doubled players’ energy expenditure compared with sedentary gaming, and suggested that it ‘might be considered for obesity prevention and treatment’ (The Economist, March 10, 2007).

 

F

 

178. facebase n. A database of faces used in the computer-based recognition and identification of a face.

A researcher at Massachusetts Institute of Technology recently developed software that can identity someone from his or her facial characteristics and even determine that person’s mood. The ‘facebase’ is already being sought out by the Defense Department and other government agencies and could evolve into an effective and potentially worrisome tool for police surveillance  (The Star-Ledger (Newark, New Jersey), November 28, 2000).

 

179.                 Facebook facelift n. Cosmetic surgery designed to improve how a person looks in photos posted to social networking sites.

Seeing themselves in high definition has led to a surge in the numbers who say they could turn to ‘Facebook facelifts’, according to new research. A survey by the media agency Mindshare found that 16 per cent of young British adults are now considering cosmetic surgery such as tummy tucks as a ‘normal’ way of improving how they look  (The Scotsman, January 28, 2013).

 

180.                 Facecrook n. A criminal who uses Facebook to commit, plan, or talk about a crime.

This article was inspired by a Facebook friend of mine who was tricked into displaying garbage on his Facebook page. ‘Outrageous Facecrooks’ (Courier Journal, July 30, 2013).

 

181.                 facial technology n. The technology required to identify and track a person using face recognition techniques.

Zelazny of Visionics said face recognition is less intrusive than iris scanning, another biometric identification technology. Aside from security systems and James Bond movies, iris scanning is not as widely used as facial technology, she said, which doesn’t require buttons and cards  (New Jersey Lawyer, October 8, 2001).

 

182.                 fakester n. A person who puts up a profile on a social networking website such as Friendster or MySpace that contains false or misleading information, or that is dedicated to another person or to an object.

In the early days at Friendster, only real individuals could create profiles. Bands were lumped in with other ‘fakesters’ the term coined by Friendster users for profiles created by impostors or dedicated to someone other than the author, such as a pet or a celebrity. The company eventually relented, and fakester profiles became an accepted part of Friendster’s culture, often taking on the function of fan clubs.

MySpace, however, has been hospitable to fakesters from the beginning – so much so that it’s now perfectly kosher for a company (or one of its fans) to create a profile for a fast-food chain, a brand of soda, or an electronics product (Technology Review, November 1, 2006).

 

183.                 fauxtoshopv. To fake a photo using Photoshop or similar image manipulation software.

Garnish with a cucumber wedge. I didn’t have one on hand, so I cleverly

Fauxtoshopped one in. It’s seamless, so you probably didn’t notice (Snapguide, July 19, 2014).

 

184.                 fiberhood n. A neighborhood that has Internet access via fiber-optic cable.

Signing up for Google Fiber isn’t simply a matter of scheduling an installation appointment. Google divided up the two Kansas Cities (Missouri and Kansas) into 202 ‘fiberhoods’ of about 800 homes each, and asked residents to preregister and plunk down a $10 fee to express their interest (Ars Technica, September 10, 2012).

 

185.                 filter bubble n. Search results, recommendations, and other online data that have been filtered to match your interests, thus preventing you from seeing data outside of those interests.

Those same kind of surprises don’t seem to happen to me the same way with online information. In the digital world, I find myself tending toward existing in a self-selected filter bubble. It’s the difference between getting too much of what I like and not enough of what I need (The Vancouver Sun, June 24, 2011).

 

186.                 flash campaign  A lobbying effort that uses the Internet and other technologies to quickly establish an agenda and build support.

The buzzword for this kind of digital activism is a ‘flash campaign’, so named for the instantaneous mobilization of support that can be generated in the flash of a mouse click….Successful flash campaigns have been mounted for political fundraising and to drum up support for issues ranging from gun control to the E-rate(Governing Magazine, August 1, 2000).

 

187.                 flash crowd A sharp and often overwhelming increase in the number of users attempting to access a website simultaneously, usually in response to some event or announcement.

Also, epicRealm can help a Web site offer certain customers priority service, just as an airline lets its frequent travelers board the plane first. In the event of a ‘flash crowd’ – a sudden storm of usage that leads to a burst of traffic – a site can direct people completing purchases to be served before those who are still browsing (The Dallas Morning News, July 12, 2000).

 

188.                 fleshmeet n. A meeting in person, especially one composed of people who usually or only converse online.

The Opera Forum is a closely knit group. With 40 or so active participants scattered across at least a dozen states and three continents, and many more lurkers, members have organized two official group ‘fleshmeets,’ and several members have attended the opera together in various cities  (The New York Times, October 4, 2001).

 

189.                 flog  n. A blog that appears to be written by an individual, but is actually maintained by a corporate marketing department or a public relations firm.  

A tip of the cap to Tom Siebert, a reporter for MediaPost, for coining the word “flog” to refer to a fake blog that poses as a consumer creation but is actually produced by professionals to sell products (The New York Times, December 18, 2006).

 

190.                 folksonomy n. An ad hoc classification scheme in which web users apply their own keywords to site content as a way of categorizing the data they find online.

Folksonomy is another example of the way in which the web 2.0 attempts to harness the collective intelligence of its users. The word ‘folksonomy’ is a spin on the word ‘taxonomy’ and refers to the collaborative way in which information is being  утя e ment on the web. Instead of using a  утя e ment form of classification, users are encouraged to assign freely chosen keywords to pieces of information or data, a process known as tagging (The Guardian (London), November 15, 2005).

 

191.                 FOMO n. The fear of missing out on something interesting or fun, particularly when it leads to obsessive socializing or social networking.

It begins with a pang of envy. Next comes the anxiety, the self-doubt, the gnawing sense of inadequacy. Finally, those feelings fizzle, leaving you full of bilious irritation.

Whether it’s triggered by Laura’s tweet from backstage at that gig or Joe’s photos from his tropical retreat, most habitual users of social media will recognize the syndrome, which now has an equally irksome acronym: Fomo.

For the uninitiated, that’s  ‘fear of missing out’ (The Guardian, April 17, 2011).

 

192.                 forehead install n. An extremely easy software installation, particularly one with intelligent default values set up at each step, so all the user has to do is press the spacebar a few times.

Personally, I have been using Win2K Pro for over 7 months and one of the best features is the Make New Connection Wizard. This easily allows most users to connect to your local area network within the office, or establish a dial up connection from off site or to set up a VPN or Virtual Private Network if you have an ADSL or cable modem at home. It is practically a Forehead Install. This is what we call, in our office at least, any installation process so simple that all you have to do is bang your forehead on the Enter key (Edmonton Sun (Alberta, Canada), February 9, 2000).

 

193.                 forever-day n. A known software flaw that never gets fixed, particularly one that exposes a security hole.

To make matters worse, many industrial control system vendors are not committed to fixing the security holes that exist in their deployed products, especially legacy products, resulting in what are called ‘forever-day(Wired, February 9, 2013).

 

194.                 fridge Googling Running an online search based on some or all of the contents of one’s fridge to locate a recipe based on those contents.

The newer term ‘fridge-googling’ has been coined to mean looking at the remnant contents of a person’s refrigerator and letting the Google search engine find a recipe that uses those ingredients (Compu-Kiss, July 26, 2006).

 

195.                 fright mail n. Letters and other mail pieces that use scare tactics to solicit money.

An Oakland woman received more than 700 pieces of fundraising mail after she contributed to a few groups that used so-called ‘fright mail’ to solicit donations (San Jose Mercury News (California), February 13, 2000). 196. friend v. On a social networking website, to add a person to one’s list of acquaintances, and vice versa.

By now, I bet almost everybody knows somebody who has joined a social networking Web site like MySpace.com, with more than 90 million members, or Facebook.com, a college-based Web site that has become a high-school favorite, too. That means most people probably also know that ‘friend’ is no longer just a noun, but a verb, one that entails minimal exertion: ‘to friend’ a person involves an exchange of mouse clicks, one to request a spot on someone’s (often very lengthy) list of people granted access to his or her online profile, and a click in response to accept the petitioner (The New York Times, July 16, 2006).

 

197.                 friends and family virus  A computer virus that infects a machine and then replicates by emailing copies of itself to people in the user’s address book.

Yeah, buddy of mine just had his OSX machine hacked yesterday… sent me and about 50 other coworkers, friends and family virus linked AIMs (TalkBass, December 13, 2009).

 

198.                 friendsourcing pp. Gathering information, recommendations, and other feedback from a trusted group of online peers.

Jeff Howe has promoted the term crowdsourcing, which emphasize the potential of internet communities in developing knowledge. Friendsourcing in some way can be seen as opposition to crowdsourcing. Friendsourcing is based on the potential of relatively small networks of friends, which have similar interests and common professions. There is no wisdom of the crowd, but wisdom of a carefully collected network of people, which becomes a high quality source of information (Historia & Media, September 30, 2009).

 

199.                 fyborg n. An organism that has become a kind of cyborg by extending its senses and abilities using technology.

So, while a cyborg would use a mathematical processing chip implanted into his brain, a fyborg would use a calculator or notebook computer to perform any difficult calculations. A cyborg may have an artificial eye overlaying an interface onto the world, but a fyborg may achieve the same thing by wearing high-tech glasses (Human Enhancement and Biopolitics, November 12, 2008).

 

 

G

 

200.                 GAFA n. The corporations Google, Apple, Facebook, and Amazon viewed as a group, particularly one that wields significant power and influence in modern affairs.

In France, there’s a new word: GAFA. It’s an acronym, and it has become a shorthand term for some of the most powerful companies in the world ‒ all American, all tech giants. GAFA stands for Google, Apple, Facebook, and Amazon (Quartz, December 1, 2014).

 

201.                 gamer shame n. Feelings of embarrassment or guilt caused by an obsession with computer games.

In my own defence, the pile of leaves in the wheelbarrow did obscure my view, but there is no escaping it: The first flower I saw this spring was smushed and sticking gamely to that wheelbarrow’s lone tire.

The gentle tug of guilt this act inspired is a familiar one at this time of year: My gamer shame kicks into high gear as the sun starts taking back the evenings. It takes hold every time I consider closing the drapes to play — glare is  the gamer’s constant enemy, right up there with skeletons with swords — and it usually propels me out the door with a book in my back pocket (The Globe and Mail, April 12, 2006).

 

202.                 gamification n. The use of game-related concepts in non-game websites and applications to encourage users to perform actions desired by the business.

Businesses, seeking novel ways to engage customers online, are turning to classic video game tactics such as awarding virtual ‘badges’, points and trophies to make their websites stickier and boost sales.

Dubbed gamification, the practice involves using game mechanics to get people to spend more time on certain products, be it a website or a piece of software. Driven by the surprise popularity of social games on Facebook and applications such as FourSquare, some businesses are experimenting with gamification to capture the attention of consumers (Los Angeles Times, February 28, 2011).

 

203.                 gator v. To display a company’s ad when a person visits a rival company’s website.

Known as hijackware, Gator software positions your banner ads directly against your rival’s site. In the States, 1-800-flowers.com found that every time a surfer searched its site for a bouquet, a ten dollar discount pop-up ad appeared for rivals FTD.com. Same thing has happened to American Airlines, who’ve been gatored by Delta(The Mirror, August 10, 2001).

 

204.                 geekerati n.The elite members of the technological class

He was owerwhelmed by an immediate onrush pf hospitality as the geekerati lined up to meet him (New York Times, October 29, 2007).

 

205.                 geeksta, adj. A form of rap music with lyrics relating to computers, technology, and engineering.

Rajeev Bajaj, a Silicon Valley entrepreneur, was a geeksta pioneer, according to the Times of India (Detroit Free Press, December 27, 2006).

 

206.                 Generation D n. The generation that has grown up with and is completely at home with digital devices and digital culture.

Wheeler said he believes that if Baltimore is serious about attracting ‘Generation D’ — the ‘digital generation’ of young computer wizards — it should use its available harbor- front property to create places that would draw them, whether it’s housing or work spaces or recreational amenities (The Baltimore Sun, September 24, 2000).

 

207.                 geotagging pp. Embedding the current geographical location within digital media, particularly photos and videos.

For example, on Helio’s Fin phone, you can automatically tag your pictures with G.P.S. coordinates (geotagging), so you can organize them by location while you travel. The Fin phone (helio.com, $129 with service plan) supports geotagging of photos, so that when you get home your photos are already a neatly organized record of where you have been. Fin also supports a Buddy Beacon function, which lets you broadcast your location to friends on Helio’s service so they can always find you (The New York Times, December 5, 2007)

 

208.                 get-rich-click adj. Relating to people who want to get rich either through online investing or by creating an Internet-related business.

The ten-minute videos ‒ think MTV’s The Real World meets America’s Funniest Home Videos — will be posted on Barseen.com, a DC-based Web site that also plans to be a multimedia guidebook to area bars when it launches in mid-March. 

The site is run by Adam Hiltebeitel, Hossein Noshirvani, and Mare Jacobson, friends who — like most twentysomethings ‒  yearned to join the get-rich-click set  (Washingtonian, April 1, 2000).

 

209.                 glassed out n. A vacant look and obliviousness to one’s surroundings caused by reading and operating a Google Glass wearable computer. And Glass hasn’t been able to ditch what could be its true Achilles’ heel: its dorky image. Labeled ‘Segway for your face’, it has become the butt of jokes on late-night television and on the Internet. Not only have Glass wearers been subjected to public ridicule for looking ‘glassed out’, they are referred to as a cross between Glass and a curse word (Los Angeles Times, August 11, 2013)

 

210.                 glasseslike adj. Resembling eyeglasses, particularly with respect to a wearable computing device.

Google’s wearable computer, the most anticipated piece of electronic wizardry since the iPad and iPhone, will not go on sale for many months….

The glasseslike device, which allows users to access the Internet, take photos and film short snippets, has been pre-emptively banned by a Seattle bar (The New York Times, May 6, 2013).

 

211.                 glasshole n. A person who uses a Google Glass wearable computer in an obnoxious, pretentious, or creepy manner.

Google has given some official advice on what to do and perhaps more importantly, what not to do, while wearing the company’s Google Glass smartglasses to avoid being a ‘glasshole(The Guardian, February 19, 2014).

 

212.                 glurge n. A sentimental or uplifting story, particularly one delivered via email, that uses inaccurate or fabricated facts; a story that is mawkish or maudlin; the genre consisting of such stories.

Two tales now making the rounds of Pensacola e-mailers involve a distorted claim about credit ratings taking effect soon and an exaggerated account of the signers of the Declaration of Independence, always a popular topic as July 4 approaches …

The account of the 56 signers of the Declaration of Independence is a case of ‘glurge’. That’s the term snopes.com uses to describe something meant to be inspirational but which undermines the message ‘by fabricating and distorting historical fact in the guise of offering ‘true stories’. (Pensacola News Journal, July 1, 2003).

 

213.                 godcasting pp. Podcasting an audio feed with a religious message.

Welcome to ‘godcasting’, in which churches use video and iPod technology to create virtual sermons that range from amateur to Emmyaward quality. Then, the ‘godcasts’ are delivered to adherents gathered anywhere – from a grocery store converted to an auditorium to a local movie theater (The Christian Science Monitor, May 18, 2006).

 

214.                 google v. To search for information on the web, particularly by using the Google search engine; to search the web for information related to a new or potential girlfriend or boyfriend.

Still a rare practice among the online masses, googling the one you (might) love is fairly common among the young, professional and Internetsavvy. ‘Everyone does it,’ said Jena Fischer, 26, a Chicago advertising executive. ‘And if [they say] they’re not doing it, they’re lying.’ (Chicago Tribune, April 2, 2001).

 

215.                 Google bombing  Setting up a large number of web pages with links that point to a specific website so that the site will appear near the top of a Google search when users enter the link text.

Since Mathes planted that first Google Bomb, the practice has spread throughout the blogging community. Here are four types of Google Bombs whose fuses have already been lit: 

1.   Humor Bombs. Mathes’ original Google Bomb remains the classic of this genre. It’s pretty funny to see your friend come up in Google as the No. 1 talentless hacking the whole world. Successful humor bombs, like most Google Bombs, require search key words that don’t get a lot of traffic. 

2.   Ego Bombs. Many bloggers want to be the top search result for their first name or full name. Free-lance writer David Gallagher posted this plea on his site: I’ve decided that I want to be the most famous David Gallagher on the Internet, and if you have a Web site, you can help. How? Link to this site like so: David Gallagher. As of March 22, he’s ranked No. 3 in Google.  3. Money Bombs. So far, no one’s paying bloggers to set off Google Bombs, but the practice is probably inevitable. Last month, Weblogger Brig Eaton floated the idea, saying that her father would be willing to pay to get his site Google Bombed into theNo. 1search result for Santa Cruz real estate. A week and a few (free) links later, www.santacruzrealty.net had moved from the No. 189 Google result to No. 39. …

4. Justice Bombs. Angry Webloggers can mete out vigilante justice by Google Bombing sites that violate the bloggers’ standards for Internet ethics (Slate Magazine, March 25, 2002).

 

 

 

216.                 googleability n. the ease with which information about a person can be found on an Internet search engine, particularly Google. 

All the Googler needs is a name, and she’s off. It’s worse if your name is unusual, as mine is. The difference in Googleability between a person with the name “Mary Smith” and a person with my name makes me wonder whether Googleability might one day affect how parents name their children. If Mary Smith had been named, instead, Upanishad Smith, she’d be more Googleable. Of course, that’s not to guarantee she’d do anything Googleworthy. But what will future conscientious parents decide? Will Googleability or anonymity be the greater gift? (The International Herald Tribune, December 5, 2006).

 

217.                 Google dorking using advanced Google search commands to gain unauthorized access to sensitive or private information on a web server.

Google dorking, or Google hacking, is one way malicious hackers can gain access to valuable information about a company. It involves using advanced commands in Google to find specific data sets that companies, as well as government agencies, have unwittingly made accessible by storing them on public-facing web servers (Entrepreneur, May 4, 2015).

 

218.                 Googlejuice n. The presumed quality inherent in a website that enables it to appear at or near the top of search engine results, particularly those of the Google search engine.  

For one thing, corporations are outnumbered by citizen bloggers who link to each other, generating the kind of Googlejuice which propels them up the search pages. Consumers doing online research find them fast (The Toronto Star, June 13, 2005).  

 

219.                 Googleganger n. A person who has the same name as you, and whose online references are mixed in with yours when you run a Google search on your name. 

Lorraine Sommerfeld is a psychiatrist in Amarillo, Texas. Lorraine Sommerfeld is also a writer in North Dakota for a rural publication called Prairie Business Magazine. Lorraine Sommerfeld in Saskatoon has a Facebook page. These are my Googlegangers (The Toronto Star, April 21, 2008).

 

220.                 Googleverse n. The products, services and technologies belonging

or associated with Google, web pages, newsgroups, images, and other content indexed by the Google search engine.

In essence, this searchable storehouse of user-contributed material reverses the usual order of things in the Googleverse (Washington Post, November 2011).   

 

221.                 GooTube  n. The business entity or web services created by the merger of Google and YouTube.

With whispers of imminent advertising and the elimination of illegal material, the exodus from YouTube may soon begin — or so hopes Arik Czerniak, chief executive of its competitor Metacafe. With roughly 16 million unique visitors per month, the website claims to be nipping at GooTube’s heels (The Toronto Star, October 22, 2006).

 

222.                 griefer n. In a game, forum, or similar online venue, a person who intentionally and repeatedly harasses other users.

This isn’t because I believe griefing is wrong. I actually think a little online anarchy is a positive thing. Griefing demands critical thinking from the griefer and urges technological improvements in everyone else (Wired, April 26, 2011).

 

 

H

 

223.                 hackathon n. A collaborative programming session, particularly one lasting several days.

Around 30 people came up and pitched their app ideas. Afterwards, the Developers and Designers vote for their favorites by giving the Idea Generator their poker chips. The top 5 ideas would be developed during the hackathon (Forbes, February 27, 2012).

224.                 hackerazzi n. A person who breaks into a celebrity’s email account or computer.

With his head hung low, Jacksonville’s so-called ‘hackerazzi’ admits he hacked into the email accounts of celebrities. Christopher Chaney faces up to 60 years in prison after pleading guilty to wiretapping and unauthorized access to a computer  (Morning News Recap (WOKV), March 27, 2012).

 

225.                 hactivist n. A computer hacker who breaks into systems to further an activist agenda.

Cries for help like that may keep the hacktivists going long after the money runs out (Newsweek, Dec.16, 2002). 

 

226.                 hackint pp. Secret information, especially of a military or political nature, obtained by breaking into a computer system.

Hacking Intelligence — information that has been obtained by hacking into a computer system and used for military purposes (The Daily Telegraph, October 25, 2001).

 

227.                 ham n. A non-spam email message; a legitimate email message that is blocked or filtered because it contains one or more keywords normally associated with spam messages.

A common concern among IT managers is avoiding spam countermeasures that create ‘false positives’ – deletions of real messages that contain an element commonly found in spam…. There is even a recently coined term for this: ham (Financial Post, February 17, 2003).

 

228.                 hardlink n. A tag, such as a barcode, assigned to an object that, when scanned with a smartphone or reader, displays online data about the object.

Although invented in Japan in the 1990s, QR codes are only just being used by UK businesses.

The code consists of black modules arranged in a square pattern on a white background.

When the encoded information is accessed via an app on a smartphone it is termed hardlinking or object hyperlinking  (The Plymouth Herald, July 28, 2011).

 

229.                 hashtag n. A word or any sequence of characters preceded by the hash sign (#), that serves to group similar Twitter posts.

They also discussed how interacting with people on Twitter is an important part of both building and joining a community. And how a hashtag is a useful way to help discover and follow topics or issues on Twitter (The New York Times, February 29, 2012).

 

230.                 hashtag activism n. Activism that uses a Twitter hashtag to promote a project or cause, particularly when it requires no other action from people.

The advent of ‘hashtag activism’ has been greeted with breathless claims about the birth of a new form of technology-based social movement. While such technologies can be extremely useful tools, they do not represent alternatives to the exhausting, age-old work of meeting people where they are, hearing their concerns, reaching common ground, building trust and convincing them that it is in their interests to act politically to change their circumstances (The Guardian, September 29, 2011).

 

231.                 hashtag-friendly adj. Of a word or phrase: short and memorable enough to be converted into a Twitter hashtag, possibly to the point of being dumbed-down or overly simplified.

Shorthand for ‘downtown Los Angeles’, DTLA has crept into the Angeleno lexicon over the last several years, a hashtag-friendly name that initially gained traction online and then bled into real life  (Los Angeles Times, January 19, 2015).

 

232.                 hashtagification n. The process of turning a word or phrase into a hashtag.

But anything can take a hashtag, and dictionary-makers aren’t going to include ‘dictionary’ next to ‘dictionary’, ‘lexicography’ next to ‘lexicography’, and so on. Something has to change in the real world for ‘hashtagification’ to lead to word-hood. Does ‘blacklivesmatter’ mean more than ‘black lives matter? Yes: it means that a huge number of people have woken up to the callous treatment by American police (and other security forces) of many of their black fellow-citizens (The Economist, January 15, 2015).

 

233.                 hate-link v. To post a link to an article or website that one vigorously dislikes.

Yet another practice, colloquially known as ‘hate-linking’, limits the algorithmic visibility of engagement, although this one is potentially traceable. ‘Hate-linking’ occurs when a user links to another user’s tweet rather than mentioning or quoting the user (ICWSM ’14: Proceedings of the 8th International AAAI Conference on Weblogs and Social Media, (April 14, 2014).

 

234.                 hearable n. A small computer or electronic device designed to be worn in the ear.

Smart ear devices, or ‘hearables’, are the new horizon in the wearable space and for good reason. Current wearables — fitness wristbands, heart rate straps, even Google Glass — tend to be novelty-based and require convincing consumers to put something new on their body. Alternatively, ear devices have the potential to make a lasting impact in the wearable space (Wired, October 1, 2014).

 

235.                 heisenbug n. A software error that disappears or changes its behavior when the programmer tries to trace it or examine it.

Building concurrent systems is hard. Subtle interactions among threads and the timing of asynchronous events can result in concurrency errors that are hard to ?nd, reproduce, and debug. Stories are legend of so-called ‘Heisenbugs’  that occasionally surface in systems that have otherwise been running reliably for months. Slight changes to a program, such as the addition of debugging statements, sometimes drastically reduce the likelihood of erroneous interleavings, adding frustration to the debugging process (8thUSENIX Symposium on Operating Systems Design and Implementation, October 8, 2008).

 

236.                 heroinware n. An extremely addictive online or computer game.

Luckily, Jaffe found refuge and eventual salvation with On-Line Gamers Anonymous ( www.olganon.org ), one of several online self-help groups that have sprung up to deal with the fallout from electronic entertainment they call heroinware. Its forums are swollen with refugees of various online worlds, all with harrowing stories of runaway gaming habits, lives ruined, friends lost, marriages broken (The Guardian, April 3, 2003).

 

237.                 horizontal portal n. An Internet portal site that offers a broad range of content and services.

Sites like Excite, Netcenter, and Yahoo! Appeal to a much broader audience base and are considered horizontal portals (PC Magazine, March 1, 2000).

 

238.                 honeynet n. A network set up to attract computer crackers so their actions can be observed.

Set up a server and fill it with tempting files. Make it hard but not impossible to break into. Then sit back and wait for the crackers to show up.

Observe them as they cavort around in the server. Log their conversations with each other. Study them like you’d watch insects under a magnifying glass.

That’s the basic concept behind honeypots and honeynets, systems that are set up specifically so that security experts can secretly observe crackers in their natural habitats (Wired News, March 7, 2001).

 

239.                 hype cycle  A sequence of events experienced by an overly-hyped product or technology, including a peak of unrealistic expectations followed by a valley of disappointment when those expectations aren’t met.

The hype cycle was devised by Jackie Fenn, an analyst at the US research firm Gartner Group, to demonstrate what happens when cutting-edge new technologies are introduced(Financial News, March 26, 2001).

 

240.                 hyper-documentation n. The exhaustive and incessant recording of the details and events of one’s life, particularly when these are shared on social media.

While photo documentation used to connote some level of importance, the ubiquitousness of Facebook and the popularity of documenting the mundane has created a situation where deciding not to document something tends to give it more meaning. As a result, the ephemeral sharing of a moment on Snapchat begins to release users from the tensions caused by ‘hyper documentation’ (The San Francisco Chronicle, August 11, 2013).

 

 

I

 

241.                 i-biology n. The use of information technology to make new biological discoveries and to improve collaboration among scientists.

Lion has dubbed the computerized approach ‘i-biology’, according to its head of bioinformatics Reinhard Schneider, and is promising Bayer that in five years its computers will discover 500 new genes, aswell as annotate 70 genes Bayer has already found. Pattern-recognition algorithms, which will drive the daily scourings of the databases, lie at the core of i-biology (Technology Review,  September 1, 1999).

 

242.                 iceberg tweeting pp. Posting a note to Twitter where the visible text is only a small part of  the overall message.

Here, we were laying the foundation for iceberg tweets – tweets beyond Barrier 140 (The Message, July 30, 2014).

 

243.                 iCrime n.. The theft of a personal media device, particularly an iPod or iPhone.

In most cases, police say the targets, perpetrators and beneficiaries of these “iCrimes” are young people. Last weekend in Toronto’s west end, four people with iPods were taken to hospital with cuts and bruises after being swarmed by a gang of youths wielding a metal mallet used to tenderize meat. Nine people were subsequently arrested and charged. At least nine people in

Toronto — most of them youths — have been mugged for their iPods since late October(Regina Leader Post, November 19, 2008).

 

 

244.                 iHunch n. The forward curve of the upper back caused by constantly looking down at a smartphone or similar device.  

If you’re in a public place, look around: How many people are hunching over a phone? Technology is transforming how we hold ourselves, contorting our bodies into what the New Zealand physiotherapist Steve August calls the iHunch. (The New York Times, December 12, 2015).

 

245.                 infobesity n. The excessive consumption of information.

As someone ever-eager to flaunt my grammatical shallowness, I felt chagrined recently when a friend dropped ‘infobesity’ into the conversation before I’d had a chance to claim this latest buzzword and introduce it in my column (The New Zealand Herald, October 3, 2014).

 

246.                 information foraging n. Searching for information, especially by using strategies analogous to the food foraging techniques employed by animals.

Information foraging theory…views humans as informavores, continually seeking information from our environment. In a sense we are foraging for information, a process with parallels to how animals forage for food. For both human and animal there are cues in the environment that help us judge whether to continue foraging in the same location or to forage elsewhere (American Society for Information Science Bulletin, June 1, 2002).

 

247.                 information scent n. The visual and linguistic cues that enable a searcher to determine whether a source, particularly a website, has the information they seek, as well as to navigate to the desired data.

In an information space like the Web, the goal is to get from one place to another, from here to there. The Web is vast, however, and spatial notions of up and down, right and left do not apply. About the only movements possible on the Web are from general to specific (when browsing through a website hierarchy), from one website to another following a link, or direct access using a search engine. In all these cases, but especially when browsing, visual and verbal cues are required to let us know that we are on the right path to the desired information. These cues are the pieces of information scent that we are following, and we choose the cues with the best likelihood (the strongest scent) of getting us to the desired destination (American Society for Information Science Bulletin, June 1, 2002).

 

 

248.                 information tamer n. A technical writer who specializes in explaining complex concepts from fields such as science and computing.

In the United States, there are now highly paid professionals charged with translating obscure technical language, although we are not greatly filled with hope about the chances of their success as even their job description charters dangerously murky linguistic waters. 

They are called ‘information tamers’, or ‘information designers’, and they are the new wave of corporate language mangler wranglers. The necessity for their very existence proves that the war is far from over (The Southland Times, March 16, 2002).

 

249.                 inline tweet n. In  an online article, a snippet of text deemed suitable for Twitter and so formatted as a special link that enables readers to easily post the text as a tweet   

There are three parts to this article. The first are some key points and highlights (with convenient, inline tweet buttons) (HubSpot, October 18, 2013).

 

250.                 innernet n. Wearable or ingested computer technology that monitors internal body functions.

[Kuzuhiko Nishi] envisions nanocomputers…that will be worn on our skin and…their tasks will include measuring changes in blood pH values, monitoring heart disease, and warning us not to nibble on those extra calories. This is  a vision of the computer as scold, nannying us through the networked connections in our lives. According to Nishi, these connections will soon be moving from the Internet…to what he calls the innernet (Wired, April 1, 1998).

 

251.                 internetese n. A style of writing prevalent in websites, email messages, and online chat rooms.

You will not encounter such niceties as good grammar, spelling or literary style. Knowles’ site is written in Internetese, a sort of stream-ofconsciousness ranting in which emphasis is provided by writing in allcapitals, and where one exclamation point is never enough  (The Globe and Mail, June 26, 1998).

 

252.                 in silico adj. In a virtual environment, such as a computer simulation.

Now, with the human genetic code at last published and loaded onto CDROMs and DVDs, scientists are talking about a new era of medicine in which medical discoveries will be made not ‘in vivo’ (in life) or ‘in vitro’ (in test tubes), but ‘in silico,’ or on computers (The Washington Post, February 11, 2001).

 

253.                 interest graph n. The set of ideas, topics, and things in which a person is interested, particularly a digital or online representation of this set.

To put this development in a broader context: the mood graph has arrived, taking its place alongside the social graph (most commonly associated with Facebook), citation-link graph and knowledge graph (associated with Google), work graph (LinkedIn and others), and interest graph (Pinterest and others) (Wired, August 19, 2013).

 

254.                 interrupt-driven adj. Relating to or  утя e ment d by constant or frequent interruptions, especially at work.

For organizations, mobile voice has begun to emerge as the default means of communication. Why should I try to call you on your office extension when the probability of reaching you is much higher if I call your cell? Yes, there’s the benefit of enhanced co-worker access, but the cost to the organization is seen in bloated cell-service budgets. More sinister, easy access promotes an interrupt-driven work style that seldom results in increased productivity (Network Computing, June 22, 2006).

 

255.                 invisible Web n. The collection of searchable websites whose content exists within databases and so cannot be indexed by search engines.

While the aforementioned Internet search resources are essential for ‘on the Internet’ searching, they do not and cannot find and make all that is ‘on the Internet’ accessible. They also do not make the material found in ‘traditional library databases’ searchable and accessible….This ‘hidden’ information is often called the ‘Invisible Web’. To see what I mean have a look at my Direct Search compilation or the Lycos Invisible Web Collection (Searcher, January 1, 2000).

 

                                                             

Р

 

256.                 iPodder n. A person who uses an iPod digital music player.

Some carried the elaborate third generation models with the iconic white earphones. Others settled for scratched, faintly retro first-generation versions and wore subdued plugs instead of the white ones they dismiss as fashion statements.

Every shade of iPodder of Manchester was out in force this week — and all were in search of the same new social event spawned by Apple’s bestselling gadget (The Independent, April 24, 2004). 

 

257.                 iPod halo effect n. The increase in the sales and perceived prestige of Apple products based on the massive popularity of Apple’s iPod digital music player.

Apple executives and industry analysts call this the Ipod ‘halo’ effect.

They say it works like this: A consumer such as Miss Farker, who had primarily used computers that operate on a Windows-based operating system, gets an iPod.

They fall in love with it, so much so that they begin buying other Apple products, eventually replacing their PC with a Macintosh, an Ibook or another kind of Apple computer (The Washington Times, May 5, 2005).

 

258.                 iPod oblivion n. Obliviousness to one’s surroundings caused by listening to an iPod or similar device.

AA patrols claim MP3s, mobile phones and other high-tech devices are becoming a deadly distraction. AA president Edmund King, said: ‘We can’t stop the march of technology, but we need to halt the iPod pedestrian, cycle and driver zombies. Whether on two feet, two wheels or four, too many people are suffering from so-called iPod oblivion’. (The Mirror, August 8, 2010).

 

259.                 IP theft v. To take copyrighted material without permission, infringe a trademark, violate a patent, or otherwise steal the intellectual property of a person or company.

At the Aug. 31 meeting, IFPI’s Taiwan branch called on the president to implement more-permanent measures to stamp out music piracy in the territory. Within a week of the meeting, National Police Chief Wang Chingguan reinstated the highly successful ‘K-plan’ anti-piracy program for three more months, from September to the end of November.

Under the K-plan, the Ministry of Economic Affairs directed Taiwan’s Second Security Police force to crack down on intellectual property (IP) theft in all categories, including recorded music  (Billboard, October 14, 2000).

 

260.                 IT rage n. Extreme anger directed at computers and technology, particularly as a result of frustrations caused by a company’s information technology policies or staff.

In focus groups, we were repeatedly told about something that people described as IT rage,’ said John Pickett, editor and publisher of CIO Canada. That rage results from employees being asked to work with technology they don’t understand, were not properly trained for or that is illsuited for their tasks, he suggested (The National Post, January 17, 2007).

 

261.                 IoT n. Shorthand reference to the collection of uniquely identifiable devices that are connected to the Internet and are capable of transmitting and receiving data over that connection.

Mr. O’Reilly, who also founded and runs the O’Reilly publishing and conference business, now says that the Internet of Things, or IoT, may be the most important online development yet (The New York Times, February 4, 2015).

 

 

J

 

262.                 jerktech n. Technology that encourages or monetizes antisocial behavior, particularly the selling of goods or services that users don’t own.

Legalities and market demand aside, the app is plain ol’ mean-spirited, as a privatization of a public service. The Twitter hashtag for this sort of thing is JerkTech(Boston.com, July 16, 2014).

 

263.                 juice jacking Stealing data from a portable device that is plugged into a hacked public charging station.

The smartphone’s ever growing ubiquity has led to the rise of public kiosks for recharging smartphones. These have been appearing in airports, malls and food courts, and come in both free and paid-for variants. The question is, are they safe to use? After all, putting a strange jack in your socket isn’t always the best idea.

The proliferation of these kiosks has led to a new type of hack called ‘juice jacking’ (CyberShack, September 15, 2015).

 

264.                 juvenoia n. The baseless and exaggerated fear that the Internet and current social trends are having negative effects on children.

And yet the overall rates of child sex crimes and of teen sex are down since the 1990s, as are juvenile crime, school violence and teen fighting. David Finkelhor, director of the Crimes Against Children Research Center at the University of New Hampshire, calls this distance between anxiety and reality ‘juvenoia’ and chalks it up to an ‘exaggerated fear about the influence of social change on children’  (The New York Times, June 26, 2011).

 

К

 

265.                 kickstopper n. An online fundraising campaign to help stop a project that is being financed through the Kickstarter crowdfunding website.

When Glowing Plant first put its project on Kickstarter, an anti-synthetic biology group in Canada launched a ‘kickstopper’ campaign to stop it. The effort amassed only $2,274  ( Fox News, March 27, 2014).

 

266.                 killboard n. In a computer game, a list of the enemies that a player has killed.

Plenty of online games emphasise the slaying of other players, many going so far as to include killboards allowing blood-thirsty junkies to tally and compare their kill ratios (The Straits Times (Singapore), January 30, 2007).

 

267.                 killographic adj. Relating to or characterised by the graphic depiction of killing or violence, particularly in a video game.

Do videogames have a politics? I ask this considering the many senses of the word, in light of an editorial from the site GamesFirst! That Slashdot linked to. The editorial assailed the mainstream gaming press for its absence at the National Summit on Video Games, Youth and Public Policy sponsored by Iowa State University and the National Institute on Media and the Family.  I’m not sure what the author, Aaron Stanton, actually takes offense with. It strikes me as nonsensical for gaming outlets — even those with lavish expense accounts — to send reporters to an event sponsored by an organization whose founder cleverly devised the neologism ‘killographic’ (like pornographic) in reference to video games(Washington Square News, October 31, 2006)

 

268.                 kleptography n. The secret theft of information using a security hole deliberately built into a cryptographic system.

Another story ‒ once again not really news ‒ describes a practice that Congress should make flat-out and unambiguously illegal: The NSA submitted to NIST (National Institute of Standards and Technology) a random number generation algorithm with a backdoor in it.

There’s actually a technical term for this sort of vulnerability: Kleptography is the use of attacks built into a cryptographic system, i.e. a crypto backdoor (ZDNet, September 6, 2013).

 

269.                 knowbie n. A knowledgeable and experienced Internet user.

Neither newbie or knowbie, I count myself among the silver surfers, those geezers in Dickensian nightshirts who preceded the blogging guys in pajamas (The New York Times, June 19, 2005).

 

270.                 knowledge engineer n. A person who gathers knowledge and incorporates it into computer programs such as expert systems and naturallanguage processing systems.

But now dozens of technology start-ups are commercializing linguistics research, and competing to hire the relatively small pool of specialists on the topic, which isn’t even taught at many U.S. universities. Suddenly, linguists have their pick of jobs as lexicographers, ‘knowledge engineers’ and ‘vocabulary-resource managers’(The Wall Street Journal, May 30, 2000).

 

 

L

 

271.                 LAN party n. A gathering where people bring their own computers, connect them together into a local area network and then play computer games — particularly first-person shooter games — against each other.

Remember the good old days of the LAN party? You might not; thanks to today’s prevalence of broadband connections, the availability of free voice and video chat services, and the ample multiplayer support found in most modern games, you no longer have to leave your home to frag your friends.

But even though they have multiple reasons to leave LAN parties behind, gamers love their LANs (PC World, December 22, 2014).  

 

272.                 laptop zombie n. At a coffee shop or similar establishment that offers free wireless Internet, a person who is oblivious to everyone and everything except the screen in front of them.

No, protests Jon Myerow, who owns a couple of craft-beer-and-cheesecentric Tria cafes in Center City, he’s not a Luddite. He’s as addicted to his BlackBerry as the next guy. But there’s a time and a place: “When you’re out with friends, we should be with friends.”…But that’s not quite how it often goes down these days – laptop zombies lurking in Starbucks, dates dumped

(for 10 full minutes at a time) to answer texts, silent ESPN crawls above the bar, as distracting as snakes on a plane (The Philadelphia Inquirer, August 26, 2010).

 

273.                 lifecasting pp. Using a portable camera to broadcast one’s activities over the Internet 24 hours a day.  

In effect, anyone who wants to wear a camera (and carry around a laptop with a wireless card) could be a star in this new genre. There was a rumour going around that actress Natalie Portman was in Silicon Valley looking for financing for a ‘lifecasting’ project, one that would give people a glimpse behind the scenes. The actress’s representatives denied the rumour (The Globe and Mail, May 19, 2007).  

 

274.                 lifestreaming n. An online record of a person’s daily activities, either via direct video feed or via aggregating the person’s online content such as blog posts, social network updates, and online photos.

They are lifestreamers, who have been simulcasting their lives 24 hours a day. Why? Because it’s there. They’d already been blogging, Twittering, Facebooking, Flickring, podcasting and YouTubing their lives. Live video was merely their next frontier. …

This means that we in the audience may not see the news on the BBC’s or CNN’s sites or shows; we may see it on the witnesses’ blogs via embeddable players from services such as uStream.tv and Justin.tv, which enable lifestreaming (The Guardian, July 16, 2007).

  

275 location awareness n. The capability to detect the exact or relative location of a device, particularly a wireless device such as a cell phone.

The golden days of automatic cell phone location cloaking are about to end. GPS and other ‘location awareness’ technologies are being built in to new mobile phones. And soon they will be able to track your whereabouts ‒ or, at least, the whereabouts of your phone (Mike’s List, January 20, 2004).

 

276.                 long data n. A massive data set that extends back in time hundreds or thousands of years.

By ‘long data’, I mean datasets that have massive historical sweep — taking you from the dawn of civilization to the present day. The kinds of datasets you see in Michael Kremer’s “Population growth and technological change: one million BC to 1990,” which provides an economic model tied to the world’s population data for a million years; or in Tertius Chandler’s Four Thousand Years of Urban Growth, which contains an exhaustive dataset of city populations over millennia(Wired, January 29, 2013).

 

277.                 ludology n. The academic study of games, particularly video games.

The college students glued to video game consoles today are as likely to be scholars as slackers. More than 100 colleges and universities in North America — up from less than a dozen five years ago — now offer some form of ‘video game studies’, ranging from hard-core computer science to prepare students for game-making careers to critiques of games as cultural artifacts

Meanwhile, on the litcrit front, some scholars have come up with a fancy name for their discipline: ludology, from the Latin ludus (game). Topics range from game philology to the study of virtual economies in EverQuest (Technology Review, March 1, 2006).

 

 

М

 

278.                 machinima n. An animated short or movie created entirely on a personal computer and ‘filmed’ in real-time using computer graphics rendering software or computer game technology.

A digital Walt Disney who wants to make a machinima film will start with a game engine, the software that generates the virtual 3-D environment in which a game like Quake II is played. This is not unusual because some game developers have made parts of their software publicly accessible, allowing players to modify a game. For instance, one might put a terrorist’s head on an opponent’s body. 

But machinima directors go a step further, discarding the game’s out-ofthe-box elements in favor of their own characters, scenery, story line and dialogue. What remains is the game’s underlying animation technology, which is really a stage on which an alien Amberson or a cartoon cat person could cavort. More than one person can use the same virtual space simultaneously, each one guiding his character through a scene while speaking its lines. A designated cinematographer chooses camera angles, adjusts the lighting and records the action. 

This is animation as improvised performance, and some of the best machinima films have the feel of live theater as enacted by cartoon puppets. It is also easy to create extended sequences. But the bottom line is the bottom line: compared to a computer-generated animated film like the critically acclaimed ‘Toy Story’ or the box-office bomb ‘Final Fantasy’, it costs next to nothing to produce a full-length machinima feature (The New York Times, July 22, 2002).

 

279.                 Mactel n. A computer with an Intel microprocessor running the Macintosh operating system and software.

The good news for Mac users is that there’s no news. The ‘Mactel’ machines run Mac OS X just the same as older PowerPC models, only faster. There’s nothing new to learn, and no adjustment period. A piece of software called Rosetta, built into Mactels, supports older Mac software written for PowerPC machines, so users aren’t forced to replace any of their applications (San Jose Mercury News, January 11, 2006).

 

280.                 mailstrom n. An overwhelming amount of email; an email deluge.

There are real advantages to email, and incorporating the risk management tips into your personal and  firm email routines will help you enjoy the benefits while staying safe from the ‘mailstrom’. (The Law Society of British Columbia, October 26, 2009).

 

281.                 malware n. Computer viruses and other software designed to damage or disrupt a system.

Technological old timers — that is to say, those of us who were computing before the advent of the Internet — remember when getting your system infected by malicious software, or ‘malware’, was  actually relatively difficult (PC Magazine, May 8, 2001).

 

282.                 man in the middle attack n. A computer security breach in which a malicious user intercepts ‒ and possibly  alters ‒ data traveling along a network.

If it delivers what’s promised, Funk’s Odyssey software will let enterprises use familiar password-based authentication for wireless LANs and existing authentication databases, but protect these interactions from the special weaknesses of wireless links, such as eavesdropping or so-called ‘man in the middle’ attacks (InfoWorld Daily News, February 5, 2002).

 

 

283.                 marketecture n. A new computer architecture that is being marketed aggressively despite the fact that it doesn’t yet exist as a finished product; the design and structure of a market or a marketing campaign.

The Advanced Micro Devices and Intel debate, always a heated one (er, sorry), has come to the fore after the launch of AMD’s Athlon XP last week. With it comes the marketecture hype that outright processor speed isn’t everything, and good luck to them if it proves to be the case (InfoWorld, October 15, 2001).

 

284.                 m-commerce n.  the delivery of electronic commerce capabilities directly into the consumer’s hand, anywhere, via wireless technology. 

Many choose to think of m-commerce  as meaning ‘a retail outlet in your customer’s pocket’ (Journal of Advanced Research in Computer and Communication Engineering, № 2(6),  June, 2013).

 

285.                 meatloaf n. Forwarded messages, jokes, lists, and other unsolicited noncommercial email messages sent by an individual to a large number of people.

In the online world, meatloaf refers to unsolicited mass e-mail sent out by an individual. These people post their personal rants and raves to an extensive mailing list compiled by collecting personal addresses from discussion groups, chat parties and so forth. These are then fired off at any time of the day or night, regardless of whether the receiver cares for what’s inside. Linguistically, it is related to ‘spam’ – the term used for unsolicited emails used for marketing and advertising, except that meatloaf is ‘home made’ (The Herald, January 24, 2001).

 

286.                 meformer n. A social network user who posts updates that mostly deal with that person’s activities, thoughts, and feelings.

Love tweeting about your social life and crave the opportunity to share your thoughts, feelings and emotions? Then you’re a meformer. But if you prefer posting links to news websites, love interacting with friends and have a cult following you’re an informer (Sydney MX, October 21, 2009).

 

287.                 memory glasses Eyeglasses that include a small video camera attached to a wearable computer that has been programmed to recognize certain faces and objects and then tell the memory-impaired user who or what they are seeing.

Newfangled ‘memory glasses’ will help anyone suffering from memory loss caused by Alzheimer’s disease, stroke and other neurological damage to identify once-familiar family, old friends and neighbourhoods (The Globe and Mail, December 7, 2000).

 

288.                 microblogging pp. Posting short thoughts and ideas to a personal blog, particularly by using instant messaging software or a cell phone.  

Twitter, which was created by a 10-person start-up in San Francisco called Obvious, is a heady mixture of messaging; social networking of the sort associated with Web sites like MySpace; the terse, jittery personal revelations of ‘microblogging’ found on services like Jaiku; and something called ‘presence’, shorthand for the idea that people should enjoy an “always on” virtual omnipresence (The New York Times, April 22, 2007).

289.                 microchannel n. A television channel or website with programs or video streams that are targeted at a small and very specific slice of the viewing audience.

Microchannels’ – which would feature on-demand content on such topics as Big Apple-area music events and entertainment – will also be in Cablevision’s digital mix. These microchannels, or ‘video magazines,’ would be VOD offerings on subscribers’ areas of passion – such as music, style, fashion and restaurants – all topics also covered by the MetroChannels (Multichannel News, November 20, 2000).

 

290.                 mindcasting pp. Posting a series of messages that reflect one’s current thoughts, ideas, passions, observations, readings, and other intellectual interests.  

Twitter, the micro-messaging service where users broadcast short thoughts to one another, has been widely labeled the newest form of digital narcissism. And if it’s not self-obsession tweeters are accused of, it’s selfpromotion, solipsism or flat out frivolousness.

But naysayers will soon eat their tweets. There’s already a vibrant community of Twitter users who are using the system to share and filter the hyper-glut of online information with ingenious efficiency. Forget what you had for breakfast or how much you hate Mondays. That’s just lifecasting. Mindcasting is where it’s at (Los Angeles Times, March 11, 2009).

 

291.                 mixed reality n. An environment that combines elements of both virtual reality and the real world.

In a conceptual leap that goes even beyond the idea of virtual worlds, the Human Interface Technology Laboratory of the University of Washington will be showing Technology in Bloom. This is an example of augmented reality. The viewer wears goggles that superimpose virtual images onto the real world. So you can see the actual room you are in, decorated with, say, a fetching 3-D virtual shrub (and you don’t even have to water it). … Another mixed reality work on display will be New York artist Camille Utterback’s Text Rain, where viewers catch falling virtual letters that appear in a mirror image of themselves  (The Boston Globe, April 12, 2001).

 

292.                 mobisode n. A short program, or the edited highlights from a longer program, designed to be watched on a small, mobile screen such as a digital media player or a mobile phone.

Indeed, ESPN’s content is perfectly suited for the mobile world. Sports fans, after all, like to closely monitor their favorite players and teams ‒ timely information that fits comfortably into what media executives call ‘snack size’ content. The News Corporation, steward of the Fox Network and Fox Studios, is so fond of short cellphone videos that it has trademarked a term to describe them: ‘mobisodes. (The New York Times, June 17, 2007).

 

293.                 mode confusion n. Confusion caused by complicated digital technology, particularly when it is difficult to discern the current state or mode of a digital device.

Alan Cooper, whose consulting firm, Cooper, in Palo Alto, Calif., helps companies make their technical products easier to use, said the profusion of digital options often creates what he calls ‘mode confusion’. This syndrome is known to afflict pilots who become dangerously befuddled by on-board automation, where a single control or sign could do or mean two different things  (The New York Times, April 28, 2002).

 

294.                 Mongolian hordes  A large number of workers hired to help complete a big or complex computer project, particularly one that is running behind schedule.

The business sponsor of the project wanted the system to be able to support dental when the system went live. ‘We looked at it and said there was no way’, he recalls. ‘We held to our guns. We knew if we bent and said yes, we really were not going to be successful. You couldn’t use the Mongolian horde theory ‒ bring in more people ‒ because we were dealing with all the same modules’  (Technology Decisions, June 1, 2006).

 

295.                 MoSoSo (Mobile  Social  Software) n. Programs that enable you to use your mobile phone to find and interact with people near you.

MoSoSos are the mobile equivalents of online social networks like Friendster and LinkedIn. They help users find old friends, or potential new ones, on the go. 

Typically, users set up a profile listing interests, hobbies and romantic availability. They also state what kind of people they’d like to meet. Because the service is tied to a mobile device, it knows when people with similar interests are near each other(Wired News, March 8, 2005).

 

296.                 MOOC n. An online course open to anyone and designed to handle

an extremely large number of students.

MOOCs (Massive Open Online Courses) are the latest addition to the acronym-bound lexicon of higher education, and quite possibly the most significant of them all. They represent a new generation of online education, freely accessible on the internet and geared towards very large student numbers (The Guardian, August 8, 2012).

 

297.                 mouse potaton. A person who spends a great deal of of time in front of a computer.

Log onto the World Wide Web, type in the address www.superbowl.com, and you enter a football fantasyland featuring equal amounts of statistics, hype, commercialism and cutting edge Internet technology.

By combining their considerable resources, the National Football League, NBC and software powerhouse Microsoft have created a Web site that in its unabashed worship of excess rivals the Super Bowl itself.

There’s a complete history of the 30- year-old event, memorable plays of the past, and everything you could possibly want to know about the Cowboys and the Steelers  

It’s enough to turn a diehard football fan into a mouse potato, planted in front of a PC, beer in lap(The San Francisco Chronicle, January 24, 2000).

 

298.                 mouse wrist n. Pain in the wrist caused by excessive or improper use of a computer mouse.

By the end of the day, your eyes are red and your vision a little blurry. Your secretary is complaining of neck pain, and your graphic designer has a bad case of ‘mouse wrist’. You know you need to do something fast. It’s time to ‘ergonom-ize’ your office(OfficeSolutions, July 1, 2000).

 

299.                 mug me earphones n. The distinctive white cord and earbuds associated with the Apple’s often-stolen iPhone and iPod digital music player.

Police suggest people make themselves ‘less attractive’ targets by being discreet when using the devices in public, swapping out Apple’s identifiable white earbuds (sometimes coined ‘mug me earphones’) for generic black ones, having the serial number on hand in case of theft, and personalizing the device in some way (Canwest News Service, November 18, 2008).

 

300.                 multi-channel shopping n. The option to purchase a retailer’s products in multiple ways, such as in a store, through a catalog, and online.

Initially, many retailers thought the Internet would mean decreased sales

for their catalog operations.

‘When you talk to brick-and-mortars, they think they’re taking sales away from other areas of the company’,Ms. Scheuer said. But the National Retail

Federation’s studies show that simply isn’t true.

With companies that give customers more than one way to shop — or ‘multi-channel shopping’ — each channel drives customers to the others.

‘More than half of online shoppers bought something they saw in the catalog, and 27 percent looked for something online that they’d seen in the store’, she said.

‘Thirty-four percent of shoppers looked for something in the store that they had seen on the Web site’(The Dallas Morning News, December 16, 2000).

 

301.                 mullet strategy n. A website design where a site’s main or most visible pages are professionally written, edited, and laid out, while the rest of the site relies on content supplied by volunteers and site visitors.

The latest buzz term in IT circles is the ‘mullet strategy’. It’s a technique the big internet sites such as CNN, Youtube and MySpace are now turning to — ‘business up front, party in the back’.

Which, when Billy Ray Cyrus is not in the picture, essentially means real, researched information is now posted up front, and all that indulgent usergenerated opining and sledging is being shoved back to the secondary pages. What’s interesting about the mullet strategy is that it represents the first signs of backlash against that heaving mass of people out there who think a domain name gives them license to share what they ate for breakfast (The Daily Telegraph, April 5, 2008).

 

 

N

 

302.                 nanopublishing n.An online publishing model that uses a scaleddown, inexpensive operation to reach a targeted audience, especially by using blogging.

Unlike Kelly’s site, Gizmodo (gizmodo.com) is built for speed and the quick hit, and it wants to be far more au courant than ‘Cool Tools’. It was launched by New York-based Brit Nick Denton — who also started the ultrahip blog site Gawker.com, a mix of New York party gossip and news. Denton’s approach to online publishing is part of trend that’s been dubbed ‘nanopublishing’ (Newsday (New York, NY), February 17, 2004).

 

303.                 narb n. An item of personal information posted online, particularly as it contributes, often unwittingly, to  a personal narrative that individual is creating online.

Social media is an online place where people tell their stories. “We call them NARBS, short for narrative bits,” said Kraft. Insurers can take advantage of this information by setting up what Kraft described as listening posts (Best’s Review, May 1, 2011).

 

304.                 nastygram n. A letter, email, or other message that insults, criticizes, or attempts to intimidate the recipient.

In fairness, the courts have ruled over the years that businesses have to defend their trademarks vigorously or risk losing them to the public domain, which would prevent them from profiting from the trademarks.

One way they do this is through the cease-and-desist letter or e-mail message—or “nastygram.”

A nastygram’ is typically just a signal that the trademark holder wants you to stop using his trademark,” says Stuart Mayer, a partner at Mayer Fortkort & Williams, an intellectual-property law firm (Consumers’ Research Magazine, April 1, 2003).

 

305.                 nearable n. A device that performs an action, such as transmitting data, only when a mobile computer or smartphone comes within range.

However, unlike wearables and hearables which move with us, nearables are static, comprising ordinary objects that become ‘smart’ once a wireless electronic sensor which also works as a transmitter (such as a Bluetooth Smart beacon) are attached to them and start broadcasting digital data to nearby devices (The Guardian (London), February 10, 2015).

 

306.                 neogeography n. The practice of combining online maps with data – such as blog posts, websites, and  annotations – related to specific places on those maps.

Schmidt spends his time wandering around his hometown of Cambridge, Massachusetts, using his custom cell-phone software to unmask the ID numbers on each GSM cell tower he passes. Then he associates that tower ID with a GPS-efined location, and uploads it to his website.

When his electronic surveying is complete, Schmidt will have a system that can tell him where he is at all times – without GPS – by triangulating the signals from the newly mapped cell towers.

Calling himself a ‘neogeographer’, Schmidt is part of a generation of coders whose work is inspired by easily obtained map data, as well as the mashups made possible by Google Maps and Microsoft’s Virtual Earth (Wired News, June 16, 2006).

 

 

307.                 netco n. An Internet-based company.

According to stock-tracking firm IPO.com, more than a quarter of the 71 Netcos that went public in the past year are now trading under their offering price ( Newsweek, April 3, 2000).

 

308.                 netroots n. A grassroots movement that uses the internet to communicate, organize, and raise money.

And yet the liberal love song continues. The posts at the liberal Daily Kos and Huffington Post websites remain laudatory.

‘Excuse Me, Waiter? There are Smart People in My Government Again!’ Brett Ashley McKenzie posted yesterday. Mr. Obama and the Netroots continue to gaze at each other with honeymoon eyes  (The Globe and Mail, November 25, 2008).

 

309.                 Netspeak n. The words, idioms, and pecularities of spelling and grammar that are characteristic of online documents and communication.

Perhaps the next great movement in English literature will somehow be fuelled by the new phenomenon of Netspeak, or what linguist David Crystal in his new book ‘Language And The Internet calls ‘computer-mediated language’. (The Toronto Star, November 24, 2001).

 

310.                 N-Gen n. The generation born since the advent of the personal computer.

There are more than 7 million North American children under the age of 18 on the Internet, says the Alliance for Converging Technologies, dubbing this group of kids as ‘The N-Gen’‒ as in the Net Generation, of course (Saint Paul Pioneer Press, October 28, 1996).

 

311.                 neurosecurity n. Security practices and protocols related to neural interfaces that enable a person to control computers and other machines using thoughts.

Despite the risks, Kohno said, most new devices aren’t created with security in mind. Neural engineers carefully consider the safety and reliability of new equipment, and neuroethicists focus on whether a new device fits ethical guidelines. But until now, few groups have considered how neural devices might be hijacked to perform unintended actions. This is the first time an academic paper has addressed the topic of ‘neurosecurity’, a term the group coined to describe their field(Wired Science, July 9, 2009).

 

 

312.                 nooksurfer n. A person who frequents only a limited number of

Internet sites.

Nooksurfer Is someone who only occasionally dives into the Web. It also means someone who visits perhaps one or two newsgroups ( Spokesman Review, June 11, 2007).

 

313.                 nose on a chip n. A computer chip with sensors that can detect chemicals associated with certain smells.

Electronic aroma-analyzers have also been used to test the quality of seafood, cheese, meat, coffee, beer, and wine, as well as a ‘nose on a chip’ that sniffs out gas leaks and pollutants (Wired, September 29, 2000).

 

 

О

 

314.                 occupational spam n. Unwanted or unnecessary messages sent over a corporate email system.

Traditionally within businesses, ‘spam’ ‒ unsolicited email, has been perceived as an external problem, caused by unscrupulous marketers out there someplace on the Net. 

But that’s not always the case, particularly within larger organisations. 

A recent survey found that 34% of internal business mail is useless. 

They have dubbed this ‘occupational spam’ and apparently it’s a big problem

In other words, a high proportion of the stuff that clogs your inbox at work is generated from within the company itself. Of course, much of this is done with the best of intentions and it’s common courtesy to respond to an email with some kind of acknowledgement, which of course makes matters worse. The same study also revealed that employees spend an average of 49 minutes per day managing email! (Business Today, January 19, 2009).

 

315.                 offline v. To disconnect, temporarily or permanently, from all online activities.

This week, full of busy schedules. Maybe I will offline for awhile (The Australian, November 29, 2015).

 

316.                 overconnectedness n. The state or condition of having an overabundance of existing or potential technologically mediated connections to other people and to online resources.

For Damien Douani, an expert on new technologies at FaDa agency, it is simply trendy now to be using the retro phone….There is also ‘a logic of counter-culture in reaction to the overconnectedness of today’s society, with disconnection being the current trend’ (MailOnline, May 26, 2014).

 

 

P

 

317.                 packet monkey An unskilled computer prankster who can only ape skilled hackers by downloading and using their programs that are designed to infiltrate and compromise computer networks.

A packet monkey is a derogatory term for a person who floods a website with data packets, creating a Denial of Service (DoS) attack. In such an attack the Web server slows or even crashes, becoming unavailable for regular business. While a DoS attack might sound difficult and even sophisticated to the casual computer user, a packet monkey uses software scripts written by others and has no real personal experience or understanding of hacking. Packet monkeys along with script kiddies are considered childish wanna-bes in the hacker community (Network Computing, July 12, 2012).

 

318.                 packet sniffer  Software that monitors network traffic to steal passwords, credit card numbers, and other sensitive data; a person who uses such software.

The modern botnet is one of the most powerful attack techniques available to today’s cybercriminal… Network-based botnet detection is a bit more complex. One approach lies in detecting and monitoring internet relay chat (IRC) traffic, which in normal circumstances shouldn’t exist on a company network.

IRC traffic is also sent unencrypted, meaning that keywords can be detected with a packet sniffer. The default IRC port is 6667, but the entire port range (from 6660-6669 and 7000) could be utilised by bots (Wired, November 1, 2005).

 

319.                 pajamahadeen n. Bloggers who expose errors made by the traditional media; people whose activism consists solely of emails and online posts.

Yesterday, a reader emailed me a ‘terrorism awareness’ video titled  ‘The Violent Oppression of Women in Islam’. … Never mind that none of these swivel chair soldiers gave a rat’s ass about women’s rights in these and other places … And still, the cry goes out, whenever these pajamahadeen want to attack Islam, where are the feminists?  (The Toronto Star, March 11, 2009).

 

320.                 pancake people Internet users who read widely, but without depth.

The changing nature of work, study and leisure is rewiring the human brain in such a way that deep reading the concentrated pursuit of linear stories and thought — is being trained out of us.

A University Of California (San Diego) study found that the amount of information the average American processed in 2008 was triple what it was in 1960. This has turned many into pancake people – spread wide and thin (FLOAT Press Blog, April 5, 2011).

 

321.                 paperless trail A sequence of electronic files or transactions that document the actions of a person or organization.

Consider the mini-crisis I dealt with a few weeks ago when one Disney executive let me know ‒ by e-mail, of course ‒ that he was furious at another executive because of an e-mail that the other executive had sent him. I followed the paperless trail to its source and read the original offending email (Vital Speeches, July 15, 2001).

 

322.                 parasitic computing  Using a series of remote computers to surreptitiously perform calculations that are part of a larger computational problem.

The combination of technological change, de-regulation, still-growing corporate power and globalization has just hammered the daylights out of

everyone who hasn’t fit the needs of the ‘new economy’ of the 21st century – which turns out to be an enormous number of people globally and domestically once it becomes evident the ‘new economy’ is very highly skewed in favour of those whose skills built it over the last 20 years, as the Internet and associated communications, including parasitic computing  what is critical to the ‘new economy’, and that is global-to-local size, scale, speed, connectedness, etc. A very great deal of what goes on is aimed at entertaining, amusing, spending time, wasting it (The New York Post, March 12, 2012).

 

323.                 participatory panopticon n. An all-encompassing system of surveillance created by the people being watched through their use of mobile technologies and trackable transactions.

This is pretty much a spot-on manifestation of the next phase of the Participatory Panopticon. The first phase used cameraphones — ubiquitous and useful, to be sure, but reactive: you had to take it out and do something to make it record. A cameraphone isn’t a tool of a panopticon in your pocket. But a wearable system, particularly something that looks stylish and not ‘tech’, leads to very different kinds of outcomes (Journal of Communication, August 4, 2011).

 

324.                 passthought n. A thought pattern that uniquely identifies a user, giving that person access to a computer system.

Ramaswamy Palaniappan, a computer scientist at the University of Essex, believes that your identity can be revealed by the brain waves that are stimulated when you gaze at a picture. He is one of a handful of researchers toiling away in the field of EEG (electroencephalogram) biometrics; another is Julie Thorpe, at Carleton University in Ottawa, who believes that we will eventually use ‘passthoughts’, rather than passwords, to access our computers (The Times (London), May 22, 2006).

 

325.                 password fatigue n. Mental exhaustion and frustration caused by having to remember a large number of passwords.

One of the tribulations of internet life is password fatigue. Use a different one for every website and you’re likely to forget them. Write them all down, or use the same one, and you risk becoming the latest victim of identity theft  (The Observer, April 22, 2007).

 

326.                 password trap  A program or website that uses a legitimate-looking interface to fool users into providing their passwords.

The ability for businesses to prove and protect online identities is a major challenge. Password traps and fishing attempts are on the rise as hackers successfully impersonate trusted companies to collect personal information, such as Social Security or credit card numbers, from unsuspecting consumers (Wire, July 22, 2004).

 

327.                 pay-as-you-app n. A mobile phone payment model where users purchase data allowances for a predefined collection of apps.

An under-discussed aspect of the Internet.org strategy ‒ which has already been tried in the Philippines, Paraguay and Tanzania ‒ is the ‘payas-you-app’ model, which charges users different rates for data consumed by different apps. Thus, while all apps are equal, some are more equal than others, in that Internet.org will subsidize them, while data consumed by other, ‘less equal’ apps will be charged on an individual basis ( The New York Times, August 2, 2014).

328.                 peep culture n. A culture in which many people write about or display  ‒ and other people to take pleasure in reading or watching ‒ the minutiae of their daily lives.

Mr. Niedzviecki believes many people welcome surveillance because the collapse of community has left them feeling disconnected and alone. Surveillance, he says, is part of the shift from pop culture to what he calls peep culture. ‘We derive more and more of our entertainment from watching ourselves and others go about our lives’, he says. ‘We’re going to enter a point where we become quite addicted to being watched’ (The Ottawa Citizen, January 31, 2009).

 

329.                 personality spam n. Incessant online posts and messages relating to one’s personal life and interests.

Where is the line, exactly, between an unsolicited email or a spam blog comment and ‘clickbait’, those seductive Huffington Post-esque headlines that suck up your attention but don’t deliver what they promise?…Or, for that matter, the people the writer Merlin Mann calls ‘personality spammers’, endlessly polluting your Facebook feed with their frenzied need for selfexpression? (The Guardian, August 9, 2013).

 

330.                 phablet n. A device that combines the features of a smartphone and a tablet computer.

This phone-tablet hybrid (‘phablet’) is meant to cater to those who want a bit of functionality from both camps. On one hand, you can make phone calls and access email, yet its supersized screen means you don’t need to squint to read e-books, watch video, play games or browse the web (Toronto Star, February 3, 2012).

 

331.                 phishing pp. Creating a replica of an existing web page to fool a user into submitting personal, financial, or password data.

The APWG reports in its new Phishing Activity Trends Report that the number of phishing attacks increased over the first three quarters of 2105. Phishers in that period increasingly targeted the customers of Internet Service Providers (ISPs), hoping to gain access to user accounts for various nefarious purposes. Phishers also intensified attacks against companies by perpetrating wire fraud scams, known as ‘Business Email Compromise’ or ‘BEC’  scams (Business Wire, December 24, 2015).

 

332.                 physible n. A digital file containing instructions that enable a 3D printer to create a physical object.

Physibles are 3D printer plans for duplicating physical objects. This is a fascinating insight and early glimpse into the post-scarcity economy. This is a landmark event marking the transition of post-scarcity from the online world leaking into the physical world (LinkSwarm, January 28, 2012).

 

333.                 phone phishing pp. Using a phone call to obtain a person’s personal, financial, or password data.

For many of the most sophisticated phishers, telephone phishing has become the method of choice for harvesting personal information. Instead of directing you to a spoofed Web site, you’ll receive an e-mail prompting you to call a customer support number. If you make the call, you’ll be connected to a real person or receive an audio response requesting your account number, personal identification number and/or password — the personal data needed to initiate a successful identity theft  (News-Press, August 1, 2005).

 

334.                 photolurker n. A person who obsessively and anonymously browses strangers’ photos posted to online photo-sharing sites.

But perhaps most disturbing of all was the detection of a phenomenon known as ‘photolurking’, which involves an obsession with browsing the online photo albums of complete strangers. 

Since the popularity of photo-sharing sites exploded, the lives of snaphappy citizen journalists have been there for the lurking. And like the experience of Robin Williams’ tragic photo developer in One Hour Photo, happy family photos offer the perfect escapism from an unpleasant reality. …

Perhaps the photolurkers aren’t entirely to blame. Some photographers are posting their most private moments online, without any password protection, for all the world to see. It’s not as if lurkers are hiding behind a bush taking pictures at your family gathering ( The Guardian, January 23, 2007).

 

335.                 piconet n. A small ad hoc network created when two or more Bluetooth-compatible devices recognize and communicate with each other.

In normal operation, Bluetooth-enabled devices search for other units and configure themselves into small networks on an impromptu or ad-hoc basis. Two to eight Bluetooth units sharing the same channel form a piconet with one unit acting as the master (EDN, March 29, 2001).

 

336.                 Pierre Salinger syndrome n. The tendency for online users, especially new users, to assume any information published on the Internet is automatically true.

Microsoft invented Windows. Bill Gates was murdered on December 2, 1999. The moon is made of green cheese. 

Can you fathom what the assertions have in common? 

The answer is they are all ‒ even the last one – lies or, to use the dominant digital euphemism, misinformation. And thanks to everyone’s favourite Frankenstein monster, the Web, we are all plagued with this kind of outwardly plausible nonsense along with pure hoaxes…

Mugs may, however, find solace in the fact that the tendency to assume anything published on the Net must be true is so widespread that it has entered the language. It is known as Pierre Salinger syndrome (South China Morning Post, August 28, 2002).

 

337.                 piggybacker n. A person who uses a wireless Internet connection without permission.

Many who are piggybackers say the practice does not feel like theft because it does not seem to take anything away from anyone. One occasional piggybacker recently compared it to ‘reading the newspaper over someone’s shoulder’.

Piggybacking, makers of wireless routers say, is increasingly an issue for people who live in densely populated areas like New York City or Chicago, or for anyone clustered in apartment buildings in which Wi-Fi radio waves, with an average range of about 200 feet, can easily bleed through walls, floors and ceilings (The New York Times, March 5, 2006).

 

338.                 pity friend n. On a social networking site, a person whose friend request you accept out of pity.

Consider paring down your Facebook friends to ensure that personalized search results are as relevant as possible (PR 20/20, May 24, 2011).

 

339.                 plonkable adj. Cheap, easy, and quick to install.

His team’s aim is to produce CSP technology that will be cheap and quick to install. ‘We are developing plonkable heliostats. Plonkable means that from factory to installation you can just drop them down on to the ground and they work (The Guardian (London), August 24, 2015).

 

340.                 podcasting pp. Publishing audio feeds that people can subscribe to and have transferred to an iPod or other digital audio player.

Podcasting: Also known as DIY radio. The idea is that anyone with a computer can record their own show and upload it to the internet; listeners can download it on to their MP3 players and enjoy it at leisure. Great: broadcast democracy at last. But you know what it means in reality is spotty teenagers playing six hours of crunk and grime, and middle-aged men uploading their entire collection of Amazulu 12’ extended remixes. (The Herald (Glasgow), January 8, 2004).

 

341.                 pod slurping n. The theft of corporate data by installing special software on an iPod or similar device and then connecting that device to a computer or network.

Pod slurping’ refers to the use of MP3 players such as iPods and other USB storage devices to steal sensitive corporate data. Usher demonstrated the vulnerability of corporate security by developing a ‘proof of concept’ software application that can automatically search corporate networks and copy (or ‘slurp’) business critical data on to an iPod. According to the white paper, “this software applications runs directly from an iPod and when connected to a computer it can slurp (copy) large volumes of corporate data on to an iPod within minutes.” And, according to the GFI white paper, slurping is not limited to iPods and MP3 players. All portable storage devices can be used to slurp information, including digital cameras, PDAs, thumb drives, mobile phones and other plug-and-play devices which have storage capabilities (Al-Bawaba, November 15, 2006).

 

342.                 pop-under n. A website ad that opens in a separate browser window hidden under the current browser window.

Tilting toward the obnoxious is a new format dubbed the ‘pop-under’ that hides behind your Web browser’s main window and surprises you when you try to close the browser. Pop-under ads hawking a ‘’Tiny Wireless Video Camera’ were shown so many times last month that X10.com, the camera maker, was the fifth most heavily trafficked site on  the Web, according to Jupiter Media Metrix (The Washington Post, June 21, 2001).

 

343.                 porn sifter n. A person who works for a content-filtering service and who searches the Internet for pornographic web pages so that they can be included in the list of sites blocked by the software.

It is the porn sifter’s task to search the web for X-rated sites so their addresses can be added to the blacklists used by filtering software (The Daily Telegraph, March 22, 200)

 

344.                 PowerPoint Ranger n. A military officer who excels at creating PowerPoint presentations.

Many members of the military should spend much of their time communicating information, but they should use all channels of communication in appropriate ways — and make sure that they are not just ‘PowerPoint Rangers’  (The New York Times, April 27, 2010).

 

345.                 PowerPointlessness n. In a PowerPoint presentation, transitions, sounds, and other effects that have no discernible purpose or benefit.

Some critics contend that PowerPoint’s emphasis on bullets and animated graphics is anathema to the kind of critical thinking students should be learning in class. 

’Beware of PowerPointlessness,’ said Jamie McKenzie, the publisher of From Now On, an online journal about educational technology (The New York Times, May 31, 2001).

 

346.                 practocalypse n. A drill that simulates a disastrous situation, particularly a shutdown of the internet.

This was only a test ‒ a cross between a role-playing game and a fire drill. The attendees were at Eyebeam, an art and technology space, for a practice Internet apocalypse, or ‘Practocalypse’, intended to teach them what to do if external forces ‒ extreme weather, tyrannical governments ‒ cause our communications systems to fail (The New Yorker, April 12, 2014)

 

347.                 pretexting n. A technique in which a person obtains confidential information by pretending to be someone who has legitimate access to that information.

Pretexting has long been a tactic used by private investigators and others to obtain personal information and records about people. Also known as ‘social engineering’ in the hacker realm, it involves using ploys to obtain data and documents (Wired News, September 13, 2006).

 

348.                 print clone n. An online version of a newspaper or magazine that is a replica of the print version.

Gradually, the publishers worked to transmute the datasets into new electronic products. For example, FirstPoint is a database which includes the Australian Digest and the Australian Case Citator, as well as basic hard copy sources in the old environment. It is an example of this new generation of offerings which will gradually replace the old ‘print clone’ datasets  (Melbourne University Law Review, December 1, 2008).

 

 

349.                 privacy management n. Organizing various aspects of one’s life ‒ particularly one’s online life ‒ to ensure maximum privacy.

The ‘dangerous’ cookie is no more than a small, harmless strand of data your computer is given when you visit some websites. Only the issuers can read the cookie and it allows them to tailor the content to your needs. If you call a second page or return to the site later it will remember you. By forcing sites to demand constantly that their web users reaffirm ‘explicit prior consent’ for each and every type of cookie delivered we will all be subjected to waves of interrupting messages and error screens. Confused users will switch off and new users will be frustrated that so many sites no longer work. It would only have been a positive move for personal privacy if browsers did not already have easy-to-use privacy management tools built in (The Guardian, November 26, 2001).

 

350.                 puddle phishing  Phishing that is targeted at a small company.

Scary statistics about Internet security were the subject of another speaker, David Culbertson, vice president, research and development, for Computer Services Inc. In Paducah, Ky.  

There is a new phishing technique called ‘puddle’ phishing being employed against community banks, which are the ‘puddle’ since they are a smaller target that has been off the phishers’ radar screen until now, he explained. While large banks have done a good job of educating their customers against phishing attacks, community and regional banks have not done so well (Bank News, December 1, 2005).

 

 

R

 

351.                 ragequit v. To stop, leave, or renounce something in a rage, particularly a video game.

An often sleazy but interesting book. Lots of suspicious claims here I have never heard before, including that Elvis was never drafted into the army but was in fact secretly enlisted by the Colonel. …Almost ragequit towards the end when the author lends credibility to the ludicrous idea that Elvis was ‘murdered’ (Goodreads, January 30, 2015).

 

352.                 rain dance  A mostly ceremonial sequence of actions performed in the hope that they will solve a computer problem.

Rain dance used for any desperate action taken to correct a problem and originally used for computer hardware ‒ reseating circuit boards, reconnecting cables, etc. ‒ as if that will magically fix an awkward bug (Daily Record, November 4, 2000).

 

353.                 ransomware n. Malicious software that encrypts a person’s computer files and demands a ransom to decrypt the files.

According to security firm Sophos, this recent Trojan extortion threat is among the first to appear in English. Previous ‘ransomware’ schemes have come from Russia and have been targeted at Russian computer users (SciTech Today, March 17, 2006).

 

354.                 reputation bankruptcy n. A theoretical system that would give a person a fresh start on the web by deleting all of that person’s online text, photos, and other data.

To allow people to escape from negative scores generated by these services, Zittrain says that people should be allowed to declare ‘reputation bankruptcy’ every 10 years or so, wiping out certain categories of ratings or sensitive information. His model is the Fair Credit Reporting Act, which requires consumer-reporting agencies to provide you with one free credit report a year — so you can dispute negative or inaccurate information — and prohibits the agencies from retaining negative information about bankruptcies, late payments or tax liens for more than 10 years(The New York Times, July 19, 2010).

 

355.                 residential gateway n. A home device that provides high-speed Internet access and is able to route incoming data to PCs and to devices such as television sets and stereos.

One of the loudest buzzwords to come out of The Yankee Group’s Networked Home Symposium in Santa Clara, Calif., last fall was ‘residential gateway’. These hardware devices promise to deliver an integrated set of telephony, Internet connectivity, data storage, home networking, and entertainment features through one box that will be capable of connecting to virtually every device in your home ‒ from your PC and PDA to your ‘70sera stereo (Home Office Computing, March 1, 2000).

 

356.                 retroware n. Old software or hardware that is still used, despite the availability of more modern versions or alternatives.

 My source for the ESC/P2 are old retroware/retro-computing software and the data will be coming out of 8-bit system emulators. I am hoping programs like xtrs (linux) and TRS32 (Windows XP) could use this driver(The Houston Chronicle, February 27, 2005).

 

S

 

357.                 samurai n. A computer hacker hired to legally infiltrate corporate computer systems for legitimate reasons.

Samurai: ethical hacker for hire; unlike criminal or vandalism-oriented hackers and crackers, true silicon Samurai adhere to rigorous and selfimposed standards of loyalty to employers; often hired to seek out rogue employees within a corporation’s technical staff  (Chief Executive, January 1, 2000).

 

358.                 scalper-bot n. A software program designed to purchase online a large number of tickets for a concert, show, or other event, enabling the person running the software to sell the tickets for a profit.

Von Ahn wrote a program that generates four random letters and numbers, distorts them, and places them on a fuzzy background. Type in the four characters correctly and you’re in. Von Ahn dubbed his invention the Completely Automated Public Turing Test to Tell Computers and Humans Apart – or Captcha – and when Yahoo began using it, the spambot problem was greatly reduced. Soon, Ticketmaster was using Captchas to keep scalperbots at bay, and AOL and Microsoft adopted them to protect their email systems (Wired, July 1, 2007).

 

359.                 scam-baiting pp. Teasing a scam artist – particularly someone running the Nigerian advance fee fraud scheme ‒ by feigning interest in the scam and forcing the scammer to perform silly or time-wasting tasks.

Scam-baiting has become the main attraction at a number of Web pages devoted to scams. Two Columbus, Ohio-area friends started the Scam Joke Page last year at www.geocities.com/scamjokepage and write under the pseudonym David Lee Roth, stringing along the scam artists who contact them and insulting them in the process. In one exchange, they suggest two fictional banks ‒ with the acronyms GRIFT and MORON ‒ that they’d like to use to send the scammer money. The scammer dutifully checks and responds that those banks don’t have branches in his country, and that Western Union would be preferable. 

The        British        authors       of      another       scam-baiting       page, www.geocities.com/a_kerenx/ call their hobby ‘the new Internet blood sport’. The pair, who often write under the name Alexander Kerensky, have tricked scam artists into waiting in front of a public webcam in Amsterdam, then posted their images on the Internet. In one exchange, they pretend to be a retired general who is naively cooperating with the scam ‒ until they invent a scheming girlfriend who threatens to expose the scam artist if she doesn’t receive a cut of the money (The Wall Street Journal, March 19, 2003).

 

360.                 screenager n. A young person who has grown up with, and is therefore entirely comfortable with, a world of screens, particularly televisions, computers, ATMs, cell phones, and so on.

The Net has become a powerful way to sell to youth, whether concerned parents like it or not. For most Gen Y kids ‒ those born in North America after 1979 (about 60 million at last count) ‒ technology is second nature. It’s as if they come into this world with a game controller in one hand and a mouse in the other. They’re referred to as generation wired, cyber tots, digital kids and screenagers, but what they really are is business. Big business (Maclean’s, December 23, 2002).

 

361.                 second screening  pp. Using a mobile device to monitor and post social media comments about what you are watching on TV or at the movies.

DCM, which is a joint venture between Odeon and Cineworld, wants to change the perception of what advertising at the cinema can offer and is testing a mobile app that encourages second screening  (Marketing Week, December 6, 2012).

 

362.                 selfie n. A photographic self-portrait, particularly one taken with the intent of posting it to a social network.

This is the shot we’ve all been waiting for: the first time that our robot on Mars would rotate its camera and snap an image of its Short Circuit-like head.

This is, as the kids would say, a ‘selfie’, a photo taken with the intent to post it to social media sites (The Atlantic, September 10, 2012).

 

363.                 self-tracker n. A person who uses websites or other technologies to meticulously track various aspects of his or her body, mental state, and activities.

The Internet had long ago turned navel-gazing into an international pastime, but self-tracking takes the self-absorption to a new level. Using elaborate graphs, pie charts, websites and newer technologies,self-trackers catalogue everything in their lives, sometimes with no clear result (The Globe and Mail, February 19, 2009).

 

 

364.                 sharebait n. A social media post with text, images, or video designed to entice the reader to share the post.

In its short life, BuzzFeed has garnered almost as much criticism as it has readers. Competitors and media critics have panned the website as a manifestation of clickable sharebait on steroids (The Sydney Morning Herald, November 28, 2014).

 

365.                 shoulder surfing pp. Stealing a computer password or access code by peeking over a person’s shoulder while they type in the characters. Telephone companies say they put a dent in this ‘shoulder surfing’ by furnishing pay phones with automatic card readers as well as plastic shields and other measures to obstruct the view of potential thieves (The New York Times, July 4, 1998).

 

366.                 showroom v. To use a retail store to view and research a product and then purchase the product for less money online.

As the last of what were once more than 500 Borders bookstores disappeared, along with hundreds of independents, Amazon helped to add a new word – ‘showrooming’ – to the fast-evolving digital lexicon (The Globe and Mail, December 23, 2011).

 

367.                 sideloading pp. Transferring music or other content to a cell phone using the cell phone provider’s network.

Carriers initially prohibited the practice of allowing users to transfer existing music from their personal digital libraries to MP3-capable phones — a process known as ‘sideloading’ — but they are now warming up to the idea. 

Motorola’s iTunes ROKR phone is the latest and best-publicized example. Cingular is not only supporting the sideloading capabilities, it is encouraging it with a rash of TV, billboard and print ads mimicking Apple’s successful iTunes/iPod campaign(Billboard, October 1, 2005).

 

368.                 silent run n. The mass transfer of funds out of a troubled bank by online users.

The widespread use of online banking services is putting banks under threat of silent runs on banks.

Customers removing cash from troubled banks leaves no clear signs that money is being withdrawn, according to a report from Reuters ( Computer Weekly, October 21, 2014). 

 

369.                 six degrees patent n. The informal name sometimes applied to a patent for a network database and system used in some social networking sites.

Abrams wasn’t concerned that Pincus and Hoffman would overtake Friendster when they struck out on their own. But that feeling was put to the test this fall, after a small company claimed ownership of a patent for software connecting people through personal associates and put it up for auction.

The patent is known as the ‘six degrees’ patent, after the famous theory that everyone on earth is connected by no more than six intermediaries ( Los Angeles Times, December 29, 2003).

 

370.                 skinnable adj. Describes a software program that is capable of using different modules‒ called skins ‒ that change the program’s colors and interface design.

Winamp is skinnable so you can change the look of the software as you wish. The Winamp site purports to offer 12,500 skins so you should be able to find something you like(Network World, July 17, 2000).

 

371.                 skyscraper ad n. An advertisement that runs vertically down the side of a web page.

The site is also selling the popular, new skyscraper ad unit, which runs vertically down the right-hand of some interior pages (Advertising Age, May 14, 2001)

 

372.                 skype sleep To create a Skype connection with a faraway partner and then fall asleep together.

Another tip for Skype-sleeping would to leave a night light or a bedside lamp on so you don’t appear as a black block on the screen (Glimmerbomb, February 28, 2012).

 

373.                 slashdot effect n. A sharp and often overwhelming increase in a website’s traffic, particularly after the site is featured on Slashdot.

As publishers, we long for those times when Internet fate smiles upon us, bestowing a mention on slashdot.org, an act that usually precipitates a favorable influx of traffic known lovingly as the ‘slashdot effect(Network Computing, June 13, 2003).

 

374.                 slideware n. A much-hyped software product that currently exists only as a series of slides in a sales or marketing presentation.

All this may sound like a description of ‘slideware’ ‒ those glowing overhead presentations given by software salesmen that rarely deliver what they seem to promise (The Economist, April 14, 2001).

 

375.                 slivercasting pp. Delivering video programming aimed at an extremely small audience.

Rocketboom’s popularity makes it a poster-child for ‘slivercasting’ in which video programming can be easily and inexpensively delivered to a niche audience ‒ something that is a huge challenge within the traditional broadcasting industry (The National Post, March 25, 2006)

 

376.                 small data  The data generated by an individual or small company.

Throughout the two days I found myself constantly presented with new ideas – of course, many of these were not new at all, just new for me to think about. So when Richard Nash talked about ‘small data’ (metadata about you: your cookies, your web search history, your Amazon clicks, and so on), I knew it was an old topic, but he brought new life to it in a way that made me suddenly start to care ( CreativePro, November 17, 2014).

 

377.                 smartglasses n. A pair of eyeglasses that includes many of the features of a personal computer, including Internet access, apps, a display, a camera, sensors, and antennae for technologies such as Wi-Fi and GPS.

Tony Fadell, ex-head of Apple’s iPod division, said the concept was ‘the craziest thing’ he worked on at the company and claimed to have made ‘a bunch’ of prototypes well before Google took its smartglasses to market earlier this year (The Telegraph, September 24, 2013).

 

378.                 smartphone n.  A mobile phone that includes many of the same features as a personal computer, particularly Internet access and apps such as a calendar and address book, a camera, sensors, and antennae for technologies such as Wi-Fi and GPS.

The Internet is crawling with viruses, and now one worm has even inched its way onto wireless mobile phones. The new Cabir smartphone worm is thought to be the first pest that spreads itself from phone to phone by means of the Blue-tooth wireless technology ( The New York Times, June 24, 2004). 379. smartphone face n. A drooping jawline and saggy jowls caused by neck muscles that have been shortened from constantly looking down at a smartphone or similar device.

Nefertiti did not have to contend with ‘smartphone face’, the term coined by cosmetic doctors to describe the shortening of the neck muscles and pull on the jowls caused by spending hours looking down at laptops, mobiles and iPads (The Daily Mail, May 5, 2013).

 

380.                 smartphoneography n. Photography using a smartphone’s built-in camera.

Taking pictures with a smartphone has become so popular, it even has its own name: iPhoneography, or smartphoneography for those with non-Apple mobile phones (The New York Times, November 16, 2011).

 

381.                 smexting n. Sending text messages while standing outside on a smoking break.

A record number of text messages have been sent by smokers who want to pass the time over a cigarette while banished to outside venues.

Experts have now dubbed the phenomenon ‘smexting(The Evening Standard, August 7, 2007).

 

382.                 smoking memo n. A memo, letter, or email message that contains irrefutable evidence of a crime.

THIRTY YEARS ago last fall, Richard Nixon was forced to resign the presidency after ‘smoking-gun’ evidence proved the full extent of the Watergate scandal.

Today, George W. Bush also faces solid evidence of presidential lying—a ‘smoking memo’ from a meeting involving British Prime Minister Tony Blair that proves the U.S. administration was determined to have its war on Iraq and prepared to «fix» the «intelligence and facts» to get it. But no one at the White House is packing their bags. Why not? (Socialist Work, June 17, 2005).

 

383.                 sneakernet n. The transfer of files from one computer to another using a floppy disk or other removable medium.

Without some type of network in your office, you will find that you have inadvertently created a ‘sneakernet’. You find yourself literally running around to each PC to move files from one to another (Computer Shopper, July 1, 2000).

 

384.                 social bookmarking pp. Saving and applying keywords to one’s personal collection of website bookmarks on a site that enables other people to share those bookmarks.

So what’s so radical about social bookmarking? How is it more exciting than Google? Well, on a purely practical level, it’s a godsend to anybody who uses more than a single computer: now, your bookmarks can be accessed anywhere. But more interesting is the kind of information it enables us to retrieve from the internet. The Google robot might seem ingenious, but it stumbles through the supermarkets and slums of the web without distinguishing them from the libraries and museums. Compared with real internet users, choosing and saving the most interesting websites, it’s very dumb. Social bookmarking separates the information from the trash, and turns searching into an art form (Financial Times (London, England), September 24, 2005).

 

385.                 socialbot n. An automated software program designed to mimic a real person on a social networking site.

Now come socialbots. These automated charlatans are programmed to tweet and retweet. They have quirks, life histories and the gift of gab (The New York Times, August 10, 2013).

 

386.                 social media n. Onlines sites and technologies that enable people to contribute or share content, discuss, rate, or categorize content, or connect or communicate with each other.

I know of young people whose lives revolved around social media and the need to be seen as continually in touch and active (Morning Bulletin (Australia), August 2, 2012).

 

387.                 social networking n. Using a website to connect with people who share similar personal or professional interests, particularly where the people in the site’s database are connected to each other as friends, friends of friends, and so on.

To attract users, Currier’s matchmaking company, Tickle Inc., recently incorporated a software feature called social networking into its website. The six-degrees-of-separation software links people through their mutual business or personal connections, allowing them to mine their friends (and their friends’ friends) for sales leads, job-hunting tips, friendship, or dates.

The digerati are anointing social networks, of which Friendster is the early leader with more than 4 million registered members, with lofty monikers like ‘Internet 2.0’ and ‘the people web’. If the Internet’s first stage, they say, was about publishing what people know, this next stage is about exploiting who people know (The Boston Globe, December 7, 2003).

 

 

388.                 social networking fatigue n. Mental exhaustion and stress caused by creating and maintaining an excessive number of accounts on social networking sites.

Since, ostensibly, it’s ‘you’ who has been providing all this content that has been lining other people’s wallets, media companies have a vested interest in hyping the idea of defining yourself. But in reality, they’re just worsening a bad case of ‘you’ proliferation.

This is why there’s been a growing online grumble about ‘social network fatigue’.  It’s more than a frustration with signing up for umpteen useless accounts; it’s the exhaustion that comes from being asked to build an online identity over and over again. Yes, young people have an inexhaustible desire to try on and discard alternative personas like clothing. But the point comes where you say, can’t I just be me? (The Globe and Mail, February 16, 2007).

 

389.                 social notworking pp. Reading and posting to a social networking site instead of working.

Slim-line, modern and slick, this metal and glass computer desk features a pull-out keyboard worktop and shelf, perfect for wasting time ‘social notworking  (Independent Extra, August 11, 2008).

 

390.                 socially produced adj. Created in collaboration with other people, particularly by using a website designed for such a purpose.

Wikipedia’s name gives the wrong impression, said Simon Fraser

University communications professor Richard Smith. The open-source site (meaning it can be written and edited by anyone) is called an encyclopedia only for lack of a better term.

‘It’s socially produced knowledge. But they didn’t know what they were producing when they began’, Prof. Smith said, explaining that many of the volunteer editors are authorities on their subjects (The Globe and Mail, May 6, 2006)

 

391.                 social swarming n. The rapid gathering of friends, family, or colleagues using technologies such as cell phones, pagers, and instant messaging.

Social swarms are easily the most common and intriguing [types of swarms] for most people. ‘Cities are important places for young people who want to meet other people of the appropriate gender for purposes of mating’, Rheingold says. ‘But also, they’re developing their social networks. In Tokyo, they flock to fast-food joints. In Stockholm, it might be a hotel with a really nice bar’.

Social swarming involves sharing your life with others in real time. It means pulsing to the rhythm of life with one’s posse. It means a nonstop emotional connection to one’s swarm (The Washington Post, July 31, 2002).

 

392.                 sock puppet n. A fake persona used to discuss or comment on oneself or one’s work, particularly in an online discussion group or the comments section of a blog.

One of the joys of the Internet age is the great new lingo it is producing. To ‘flame wars’ and ‘phishing’ we can now add ‘sock puppet’. A sock puppet, for those still boning up, is a false identity through which a member of an Internet community speaks while pretending not to, like a puppeteer manipulating a hand puppet. Recently, a senior editor at The New Republic got in trouble for some particularly colorful sock puppetry (The New York Times, September 13, 2006). 

 

393.                 Sofa Sunday n. The Sunday after the United States Thanksgiving holiday, when people relax at home and purchase goods online or on TV.

Sofa Sunday is a real day, where everyone dresses up in impractical loungewear and goes shopping on their mobile devices. It’s apparently the busiest online shopping day of the year, with most purchases being made between 9pm and 11pm (The Guardian (London), November 24, 2014).

 

394.                 SoLoMo n. Mobile phone apps that combine social networking and location data.

One of the panel moderators at Social-Loco cited a term coinage by noted Silicon Valley investor John Doerr that’s more useful to understanding what Google is up to than the concept ‘social’ alone: SoLoMo, or social + location + mobile (InformationWeek, May 6, 2011).

 

395.                 songlifting pp. Illegally downloading music.

The term ‘songlifting’ appears to more narrowly define who is being targeted. A ‘songlifter’ implies one who uploads; while presumably a ‘songdropper’ would be the contrary (Slyck, February 28, 2006).

 

396.                 sousveillance n. A form of countersurveillance in which people watch and record the activities of monitoring devices and other surveillancerelated equipment and personnel.

The science and technology of surveillance extends beyond electronics and nanotech to sociology. For example, surveillance has spawned a lowlevel popular response called ‘sousveillance’, whose self-assigned role is to ‘out the cams’. 

In Manhattan, a cheerful group of anarchists called the NYSCP (New York Surveillance Camera Players) detects hidden eyes on sign poles and light standards, then mugs before them in an attempt to embarrass their human monitors. Unfortunately, this may defeat the NYSCP’s aim of discombobulating the human component of surveillance: Anything that relieves the tedium of staring at monitors probably pleases the watcher (The Globe and Mail, September 13, 2005).

 

397.                 spamdexing pp. Repeating a word dozens or even hundreds of times within a web page.

There’s also ‘spamdexing’, which involves repeatedly using certain keywords – registered trademarks, brand names or famous names ‒ in one’s Web page. Doing this can make a Web site move to the top of a search engine list, drawing higher traffic to that site ‒ even if the site has nothing to do with the search request.

‘What will happen is you’ll do a search for Bank of America and you could be diverted to a third-party cloned site that could steal your personal and confidential information’, said MarkMonitor CEO Faisal Shah, explaining that in this example, cyber criminals could embed the Bank of America name in hidden areas of their site to make this occur (The Idaho Statesman, January 7, 2003).

 

398.                 spaxel n. A display element that can be positioned in any of the three spatial dimensions.

Ars Electronica Futurelab staffers have been doing R&D since 2012 on what they’ve dubbed Spaxels (space pixels) a swarm of LED-equipped quadcopters that can fly in precise formation and thus ‘draw’ threedimensional images in midair (Ars Electronica, September 3, 2014).

 

399.                 spear-phishing Phishing targeted at a specific person, usually by sending an email message crafted to appear as though it was sent by someone known to the recipient.

More recently, however, a hybrid form of phishing, dubbed “spearphishing,” has emerged and raised alarms among the digital world’s watchdogs. Spear-phishing is a distilled and potentially more potent version of phishing. That’s because those behind the schemes bait their hooks for specific victims instead of casting a broad, ill-defined net across cyberspace hoping to catch throngs of unknown victims.

Spear-phishing, say security specialists, is much harder to detect than phishing. Bogus e-mail messages and Web sites not only look like near perfect replicas of communiqués from e-commerce companies like eBay or its PayPal service, banks or even a victim’s employer, but are also targeted at people known to have an established relationship with the sender being mimicked (The New York Times, December 4, 2005).

 

400.                 speed bumpn. Software or hardware added to a securities trading system to slow down high-frequency, computer-generated orders.

As he digs deeper, he realizes that secretive high-frequency trading firms, taking advantage of lightning-fast computers, willing accomplices in the stock exchanges and some poorly thought-out federal regulation, have effectively hijacked the equity markets. Roused to action by what he has discovered, Katsuyama quits his job and starts up a new exchange, IEX, which includes a clever ‘speed bump’ that levels the playing field for investors  (The New York Times, April 4, 2014).

 

401.                 spim n. Unsolicited commercial messages sent via an instant messaging system.

Marketers have never seen a medium they didn’t want to exploit. So it is that spam has come to instant messaging-yielding IM spam, or spim. It’s been around a few years, but only in the past few months has it reached the threshold of disruption. 

Officials at America Online, which runs the popular Instant Messenger service, and Microsoft, which runs MSN Messenger, say they’ve seen an increase in the amount of IM spam. Messaging and collaboration research firm Ferris Research estimates that the quantity of such solicitations doubled from 2002 to 2003, reaching 500 million last year(InformationWeek, January 19, 2004).

 

402.                 splinternet n. The internet splintered into multiple segments, streams, or classes based on factors such as cost, speed, platform, or political motivations.

Today’s internet is actually a splinternet. The day of an e-commerce team being able to focus on building just a website are over and with the increasing complexity of consumer touch-points comes a real burden on ecommerce executives to support the underlying systems and platforms necessary to sustain them efficiently and at scale. While e-business executives once worried about  утя e men sites for various web browsers, today they must consider mobile browsers, mobile applications, location-based marketing, rich internet applications, as well as integrations with marketplaces and social networks (Computer Weekly, December 8, 2010).

 

403.                 splog n. A fake blog containing links to sites affiliated with the blogger with the intent of boosting the search engine rankings and ad impressions for those sites; spam links added to the comments section of a blog.

Polluting the blogosphere like spam in email inboxes, a rising portion of blogs are created for the sole purpose of getting search engine attention so they can promote affiliated web sites.

These ‘spam blogs’ now comprise 10 to 20 percent of all blogs, according to Umbria, a Boulder, Colorado-based intelligence company that monitors blogs for its clients. 

The blend term ‘splogs’ was popularized by Mark Cuban, the outspoken entrepreneur and investor(Red Herring, December 27, 2005).

 

404.                 spyware n. A software program that surreptitiously sends data to an individual or a company when the computer on which the program is installed is connected to the Internet.

A computer with an always-on connection has a permanent IP address, which makes it especially vulnerable to hackers’ ‘Trojan horses’ or so-called ‘spyware’ attacks (Edmonton Journal (Alberta), February 17, 2000).

 

405.                 stalker site n. A website devoted to a celebrity, the content of which clearly indicates that the fan who created the site is obsessed with their subject.

Gone are the days of the drummer’s aunt sitting in a makeshift office in the spare bedroom sifting through bags of mail. Now there tends to be two types of site ‒ the official initiative from the record company and the alternative fan or stalker sites ( The Guardian, February 26, 2001).

 

406.                 stealth wear Clothing designed to prevent the wearer from being tracked, recognized, or photographed, particularly by surveillance systems.

Clothing and accessories designed to help individuals remain anonymous in public, known as Stealth Wear, are becoming increasingly popular ( SiliconAngle, July 1, 2013).

 

407.                 stego v. To hide secret information electronically by embedding it inside an ordinary file such as an image or sound clip.

Something is ‘stegoed’ in the wired world when encrypted words, diagrams, maps or images are embedded into an existing electronic image, text or audio file. The hidden information is invisible and available only to somebody who knows it’s there, how to get it and how to unscramble it (The Globe and Mail, October 27, 2001).

 

408.                 sticky adj. Having content or features that encourage online visitors to linger at a website.

But it was not realistic to expect a single website would become the predominant way people accessed  the internet.

‘We’re not about building a portal’, she said. SeniorLink was a resource for people to use.

Ms Schneider said many sites tended to focus on generating traffic and making themselves ‘sticky’ to lure advertisers ( The Australian, May 2, 2000).

 

409.                 stingray n. A device that spoofs a cellular network tower to identify and track mobile phones.

Police in Florida have offered a startling excuse for having used a controversial ‘stingray’ cellphone tracking gadget 200 times without ever telling a judge: the device’s manufacturer made them sign a non-disclosure agreement that they say prevented them from telling the courts (Wired, March 3, 2014).

 

410.                 streamies n. People who listen to Internet-based radio or music broadcasts.

Internet radio is popular in Australia, with Real Audio claiming 2.2 million au downloads, says Undercover executive producer (music) Paul Cashmere.

‘When people are surfing the Net, the number one thing they do at the same time as they are surfing the Net is listen to radio. In America they’ve even a name for these listeners now – they’re called the streamies’, he says  (The Age (Melbourne, Australia), April 4, 2000).

 

411.                 Streisand effect  The widespread dissemination of information caused by an attempt to suppress that information.

The Digg-DVD donnybrook is the latest example of what’s come to be called the ‘Streisand Effect’, in which efforts to squelch a bit of online information lead to that information being much more widely disseminated than it otherwise would have been.

The name stems from singer Barbra Streisand’s 2003 lawsuit aimed at forcing a photographer, who was documenting coastal erosion, to remove photos of her seaside mansion from his previously obscure website. Thanks to publicity from the lawsuit, the pictures spread widely on the Internet  (The Globe and Mail, May 3, 2007).

 

412.                 Stupids n. A group or class of stupid people; non-programmers as seen by programmers.

As I’ve said before, the thought that we’re paying the salaries of 30,000 federal employees to studiously search the make-up pouches of middle-aged women means only one thing: The Stupids are in charge (Sun-Sentinel, March 6, 2002).

 

413.                 subtweet n. An insulting or suggestive Twitter post that indirectly mentions another Twitter user, thus reducing the chance that the other person will see the message.

Much ink and many, many snide subtweets have been spilled over the question of whether Obamacare’s expansion of health insurance will actually generate health gains (The Atlantic, May 6, 2014).

 

414.                 sucking mud Not working; crashed.

When a web server is sucking mud what is it doing? … It is

malfunctioning. The term is used in the oil exploration industry to describe a malfunctioning pump (The Guardian (London, England), January 3, 2002).

 

415.                 success theater n. Posting images and stories designed to make others believe you are more successful than you really are.

We’ve become better at choreographing ourselves and showing our best sides to the screen, capturing the most flattering angle of our faces, our homes, our evenings out, our loved ones and our trips.

It’s success theater, and we’ve mastered it  (The New York Times, December 28, 2012).

 

 

T

 

416.                 targeted Trojan horse n. A Trojan horse program sent as an attachment in an email message that has a subject line, body text, and return address that have been crafted to fool the recipient into opening the attachment.

Banks, too, need to put in similar monitoring systems to score every single activity for risk, particularly at a time when phishing, pharming and targeted Trojan attacks are becoming more common, he says (Computerworld, November 7, 2005).

 

417.                 tech-free tourism n. Travelling without a mobile phone or similar devices, particularly to places that block or cannot access internet and cellular signals.

We’re adding one more travel trend to our 2014 list ‒ tech-free tourism. If you’re addicted to your gadgets and social media, going cold turkey has never been scarier. So here are our top travel destinations ‒ with device-free policies and/or sans wifi (the horror!) ‒ that’ll help you quash that FOMO (The Honeycombers, April 1, 2014).

 

418.                 technology buttler n. A hotel staff member who performs computer-related tasks and helps guests with software and hardware problems.

For guests visiting on business when time is of the essence, Mandarin Oriental, Hong Kong has put together the perfect accommodation package. The “Business on the Run” package includes complimentary pressing, internet access, local telephone calls, technology buttlers and buffet breakfast (Mandarin Oriental, March 22, 2011).

 

419.                 techno-creep n. The gradual encroachment of technology into every aspect of society.

Technology is also infringing on our home lives, with Moggridge citing a ‘frightening’ trend in South Korea to have sophisticated workstations fitted in the bedrooms of children as young as eight. But he doubts such techno-creep will be pandemic – after all, in the US, he says, ‘most homework is done in the car’ (South China Morning Post, November 24, 2006).

 

420.                 technopropism n. The humorous misuse of a word or phrase, particularly one that is not flagged by a technological tool such as a spell checker or grammar checker.

Technopropisms…are mistakes that the human eye might catch, but which survive such technical aids as spelling checkers (Merriam-Webster, January 1, 1999).

 

421.                 telematics n. The long-distance communication of computer data.

Broadly speaking, telematics represents the convergence of four familiar technologies: the automobile, computing, wireless communications and the Global Positioning System. Several manufacturers, including General Motors, Ford, BMW and Mercedes-Benz, already offer new-car buyers factory-installed telematics systems that provide emergency assistance and navigational aids. Some also provide access to personalized communications, like concierge services or on-demand voice-synthesis stock quotations (The New York Times, June 14, 2001).

 

422.                 thumb culture n. People who are skilled at using their thumbs to manipulate objects such as cell phone keys, small joysticks, and notebook computer pointers.

Indeed, Japan is the model for a wireless-entertainment culture. NTT

DoCoMo, that country’s largest wireless company, has surprised and transformed the nation with a service called “I-mode,” which allows subscribers to access games and other online entertainment wirelessly. The imode service requires a special cell phone with a slightly larger than ordinary screen (typically three by four centimeters). . . . I-mode is phenomenally popular, engendering a ‘thumb culture’ of 30 million subscribers—an estimated 80 percent of people worldwide who currently use wireless devices to connect to the Net (Technology Review, July 1, 2002).

 

423.                 thumbstopper n. An eye-catching or compelling item that makes a person stop scrolling through a list of posts, particularly when using the thumb to scroll a touchscreen device.

Logic would suggest that thumbstoppers are much easier to accomplish with big consumer brands like Oreos, McDonalds, and Wendy’s because there’s a wider audience of cookie and hamburger lovers than there are krill oil aficionados  (Business 2 Community, August 6, 2014).

 

424.                 toasted skin syndrome A skin rash caused by lengthy exposure to a heat source, such as laptop computer balanced on the thighs for an extended period.

Balancing your laptop on your knees could cause permanent discolouration of the skin and, in rare cases, cancer, doctors have warned. The heat generated by the computers can cause a nettle sting-like rash — a condition named ‘toasted skin syndrome( Daily Mail, October 5, 2010).

 

425.                 touchdown center n. A facility where business travelers can make calls, plug in their notebook computers, and connect to the Internet.

Innovation in property formats will certainly be needed as the melding of the powerful forces of technology and communications, alter the way business is conducted and transacted. We are already witnessing the growth of new taxonomies — local  утя e ment depots, distribution parks, retail showcases, touchdown centres, commercial villages, loft offices, [and] leisure quarters (Business Times (Singapore), June 1, 2000).

 

426.                 tradigital adj. Relating to art, especially animation, that combines both traditional and computer-based techniques.

Katzenberg believes that Disney would approve of the changes in the way cartoons are made today. He has coined a term for the blending of computer animation with classical cell animation techniques ‒ ‘tradigital’. And he says that the style, which burst on the scene with such films as Toy Story, Antz, Shrek and Ice Age, is here to stay(The Orlando Sentinel, May 24, 2002).

 

427.                 transliteracy n. The ability to read and write using multiple media, including traditional print media, electronic devices, and online tools.

Transliteracy might provide a unifying perspective on what it means to be literate in the twenty-first century. It is not a new behavior but has only been identified as a working concept since the Internet generated new ways of thinking about human communication (The Guardian, March 31, 2008). 

 

428.                 triple delivery n. In a PowerPoint presentation, having the same text onscreen, on a handout, and spoken aloud.

What about handouts? At a recent lecture to medical students, I announced that there would be no handouts. It was official university policy that students were expected to listen and take notes. Shock, horror! One student stood up and announced: ‘On behalf of the class, we demand handouts’. Handouts are part of what is now known as ‘triple delivery’. The material is on the screen, in the handout, and read out word for word. Mindnumbingly boring. These days it is also expected to be on the web. Quadruple delivery; no need to attend the lecture at all (The Sydney Morning Herald, January 30, 2004).

 

429.                 troll farm n. An organization whose employees or members attempt to create conflict and disruption in an online community by posting deliberately inflammatory or provocative comments.

The agency had become known for employing hundreds of Russians to post pro-Kremlin propaganda online under fake identities, including on Twitter, in order to create the illusion of a massive army of supporters; it has often been called a ‘troll farm(The New York Times, June 7, 2015).

 

430.                 tube site n. A video sharing website modeled after YouTube.com, particularly one that specializes in pornographic movies.

Specifically, MindGeek owns a large number of porn aggregator ‘tube sites’ (so named because they mimic YouTube’s format) such as Pornhub, YouPorn, and Redtube, which serve up huge amounts of free porn funded by ads (Slate, October 23, 2014).

 

431.                 type-in traffic n. Users who navigate to a website by typing the site’s address into their web browsers.

A colleague reminded me that Marchex, the public company roll up of online advertising plays, recently purchased Name Development, a company that owns a couple hundred thousand URLs. … The price was $165 million.

The business model for Name Development is drop dead simple: they own a bunch of URLs, and when internet users type a word into the address bar (expecting it to resolve to something useful) or misspell a legit URL, often times one of Name Development’s URLs comes up as the resolved address. Name Development then sticks a shotload of AdSense or Overture links on the resulting page, and voila free money!

This is called the ‘type-in traffic’ market, and it apparently is much, much bigger than most folks might think. According to folks I’ve spoken to, Name Development gets 17-20 mm  утя e on its 200,000 domains, and is a profit machine  (South Florida Business Journal, , December 14, 2005).

 

432.                 typosquatter n. A person who registers one or more Internet domain names based on the most common typographical errors that a user might commit when entering a company’s registered trademark name.

Typosquatting: This happens when an Internet user looking for, say, ebookseller Amazon.com may type in ‘Amazon’ by mistake and ends up at a bookshop run by a rival company. Typosquatters draw away valuable business from the original domain name owner (Business Times (Singapore), July 17, 2000).

 

433.                 tweet seats n. A section in a theater set aside for people who want to tweet during a performance.

‘Tweeting is so natural for theater’, said Michael Yawney, an associate professor of theater at Florida International University. …That’s one of the reasons why the Palm Beach Opera began offering tweet seats in December for a performance of ‘Madam Butterfly’ at the Kravis Center for the Performing Arts in West Palm Beach  (Florida Sun Sentinel, February 20, 2012).

 

 

434.                 tweetstorm n. A flurry of Twitter posts from a particular person or about a particular topic.

A tweetstorm will often start with a profound thought or open-ended question of some sort as a wind-up. The ‘1/’ serves as the readers’ only early warning, which one can read as a Jim Carrey-esque inhale before delivering a breathless rant(BuzzFeed, May 7, 2014)

 

435.                 tweetup n. A real world meeting between two or more people who know each other through the online Twitter service

People keep coming, conversations are perpetually on, someone leaves, and someone else joins in. You chat with your friends and acquaintances regularly and ever so often you also meet one of their friends. You join into their conversations and make new friends in the process. Someone you didn’t know earlier reaches out to connect; you do the same when you want to reach out. This café is virtual, but the people are real and they do meet up often — at work, at parties, at Tweetups (offline group meets of Tweople, as Twitter users are called).(Hindustan Times, May 7, 2008).

 

436.                 twitchfork n. An angry or aggressive protest on Twitter, particularly one seeking justice or vengeance.

Local and international firms must take great care to avoid using advertising that projects racial stereotypes or racism. Even if these offenses result from innocent mistakes, image problems can spread fast, especially in a world of angry Twitter mobs wielding ‘twitchforks’ around the clock  (Deseret News, January 27, 2012).

 

437.                 Twitterverse n. The Twitter social networking service and the people who use it.  

Shashi Bellamkonda, Network Solutions’ social media swami (yes, that’s his real title), organized the tutorial, attended by about 30 people. He’s a more prolific Twitterer than most, posting anywhere from five to 15 tweets per day about anything from his daily routine to the news. Big companies such as Dell are active in the Twitterverse addressing customer service issues, he said. (The Washington Post, March 9, 2009).

 

438.                 twimmolation n. The destruction of a person’s career or reputation caused by lewd or insensitive Twitter posts.

But Gottfried is the latest example of a firing over a quick, ill-advised tweet: what, for a lack of a better word, I will calltwimmolation.

Should we just accept that in the future, to over-paraphrase Warhol, we will all get ourselves fired in 140 characters? Or will the ease and accessibility of social media‒ and some tipping point of twimmolations‒make people realize that everyone screws up, and increase our tolerance for the occasional idiotic, even beastly remark? (Time, March 15, 2011).

 

439.                 twintern n. An intern hired to monitor and post messages to a company’s social media accounts.

You know all of those unpaid work experience kids that are handed the keys of a business’ Twitter account? They now have a name for their situation ‒ ‘twinternship’ (StartupSmart, January 22, 2013).

 

 

U

 

440.                 ubicomp n. A computing model in which information technology is pervasively and seamlessly integrated into the objects and activities that people use in their daily lives.

My desk is a mess of both electronics and paper, and I spend days poring over magazines, staring at websites and digging around in info of all sorts. It probably explains why I get unfeasibly interested in projects which bring the virtual to the physical (or vice versa). Sometimes they’re called ubicomp and sometimes they’re just fun (Guardian Unlimited, January 21, 2009).

 

441.                 ugly selfie n. A deliberately unattractive photographic self-portrait.

Amid the bared midsections and flawless smiles flashed all so often on the screen comes the explosion of the ugly selfie, a sliver of authenticity in an otherwise filtered medium  (The New York Times, February 21, 2014).

 

442.                 UMPC  n. An extremely small, lightweight computer that has many of the functions and features of a full-size personal computer.

At a computer trade show in Germany, South Korea’s Samsung

Electronics Co., Taiwan’s Asustek Computer Inc. and China’s second-largest PC-maker, Founder Group, said they will each sell PCs based on a design that Microsoft code-named Origami. The companies are formally calling the products Ultra-Mobile Personal Computers, or UMPCs

The devices run Microsoft’s Windows XP operating system and feature additional Microsoft software that lets users control the PC with the touch of a finger. The Origami devices, which are expected to be about 2 pounds and come with a screen that measures 7 inches diagonally, are a smaller followon to tablet PCs, which are pen-input devices about the size of standard notebook PCs (The Wall Street Journal, March 10, 2006).

 

443.                 undownloading pp. The deletion of an e-book or similar download by the original provider of that download.

Recently ebook vendors have introduced a new word entered our renter society: ‘undownloading’. Highlighted on Techdirt by Glyn Moody, undownloading happens when your ebook provider discovers that you’ve made the mistake of traveling where it has no legal right to sell you books, so it decides to rip the books off your device(ReadWrite, October 31, 2013).

 

444.                 ungoogleable n. A person for whom no information appears in an Internet search engine, particularly Google.

Amnemia: The loss of all memory tricks related to name recall, brought about after years of relying on Photobucket, Facebook and Google to look up all the names on the business cards one has collected. Amnemia manifests itself when one finally meets an ‘ungoogleable’ and can be cured either by, well, learning to remember people, or more easily by snapping camphone shots of everyone one meets(Valleywag, December 28, 2006).

 

445.                 unsourcing pp. Transferring company functions from paid employees to unpaid volunteers, particularly customers on social networks.

Unsourcing reveals that the digital-sharecropping model of low-cost online production has applications beyond media creation and curation. Businesses of all stripes have opportunities to replace paid labor with play labor. Call it functional sharecropping  (Rough Type, May 28, 2012).

 

446.                 unstrung adj. Relating to a person or technology that uses wireless communications to access the Internet.

UNSTRUNG No wires! A catch-all term for wireless internet applications and technology (The Independent, November 3, 2001).

 

447.                 urban miner n. A person or company that extracts metals from discarded electronics.

Business owner Jerry Shelfer and his wife, Michelle, started Hi-Tec

Recycling in 2003, gathering up discarded computers, monitors and other electronic gear before they enter landfills. … Calling himself an ‘urban miner’, Shelfer says everything from the memory chips in computers to the copper wiring in cables has some value ( The San Francisco Chronicle, August 15, 2010).

 

 

V

 

448.                 videophilia n. A sedentary lifestyle focused on screen-based activities, particularly television, the Internet, and video games.

Numbers tell us people don’t participate in outdoor activities the way they once did. … Visits to national parks are down, as are fishing, hunting and even watching wildlife. Only 25 percent of the population — down 18 percent — participates in an outdoor activity.

Scientists call it ‘videophilia’ – a way of life connected to computers, video games and TV(Grand Rapid Press, March 16, 2008).

 

449.                 viewser n. A person who watches video content online or on a computer, or who combines regular TV watching with related digital content.

Now, the technology is so advanced and changing, even the industry word for a person who watches TV has changed, Heizman says. It used to be “viewer.” The new word is ‘viewser’ Today’s viewser doesn’t necessarily watch TV. He might click to the station’s Web site, instead — todaysthv.com. He might call the Weatherline. He might catch the news on his cell phone (Arkansas Democrat-Gazette, June 25, 2006).

 

450.                 virch n. Colloquial shortening of the phrase ‘virtual reality’.

Three weeks after he first experienced the results of the new virtualreality production process, Shore paid a second visit to Menlo Park — this time with 61 names he had culled from his master list of 1,200. …The first name was Virch, for ‘virtual’ reality(The New York Times, January 15, 2015).

 

451.                 virtual mobbing pp. Using online media and technologies to attack or gang up on a person.

The background against which the inquiry took place was an increasing number of situations in which people were committing criminal offences using social networks ‒ particularly Facebook and Twitter. The committee examined instances of cyber bullying, revenge porn, trolling and virtual mobbing to try and determine whether or not they were criminal offences and if they were, whether new legislation was required to deal with them  (Wired UK, July 29, 2014).

 

452.                 virtual visitation n. Long-distance access to a child by a divorced parent using technology such as a broadband Internet connection and a webcam.

With work and the school week behind them, Charles A. Mason III and his daughter, Arielle, who live more than 1,500 miles apart, prepared for their scheduled weekend visit. There was no packing involved, no plane tickets, no car rides or drop-offs. All it took was some instant messaging on their home computers and a little fidgeting in front of their respective Webcams, and father and daughter were chatting, playing checkers and practicing multiplication tables. 

‘It’s funner than talking on the phone, because I can see him’, said Arielle, 10, who lives with her mother in Longmont, Colo., but has regular ‘virtual visits’ with her father as part of the custody arrangement her parents worked out after her mother moved eight years ago. ‘It’s just like being in front of him, but with games and computer stuff added’ (The New York Times, March 19, 2006).

 

453.                 virtual volunteering pp. Performing charity work online.

Virtual volunteering can be an efficient and cost-effective way to help organizations, said Gordon Mayer, vice president of Community Media Workshop, which provides communications training for Chicago-area nonprofits. … Some organizations have found that virtual volunteering lets them harness the talents of people who have only a few intermittent hours to give (Chicago Tribune, December 11, 2009).

 

454 vishing pp. Attempting to fool a person into submitting personal, financial, or password data either by sending an email message that includes a scammer-controlled phone number, or by spoofing an automated phone call from a financial institution using the voice-over-IP system.

According to the FBI, there is a sudden rash of vishing across the country, the BBB reported in a release. ‘Vishing’ is the term for automated calls or text messages to phones and cell phones with the specific goal of gaining personal information for the purposes of identity theft. ‘Phishing’ is when the scam is perpetrated by e-mail.

In the calls, or text messages, residents are warned that their accounts will be closed or have been used improperly and they are told to call a 24hour number to reactivate it. Callers are then asked to punch in their debit card numbers and their personal identification numbers (Greeley Tribune, December 9, 2008).

 

455.                 vlog n. A blog that contains mostly video content.

Can you vlog a dead horse? Only if you make a video of it and post it on the Web.  

After blogging came photo blogging and then, suddenly last year, video blogging. Video bloggers, also known as vloggers, are people who regularly post videos on the Internet, creating primitive shows for anyone who cares to watch. Some vlogs are cooking shows, some are minidocumentaries, some are mock news programs and some are almost art films (The New York Times, July 25, 2005).

 

456.                 vodcasting pp. Podcasting video content.

University of Illinois at Springfield … also is exploring enhanced podcasting and vodcasting, which incorporate more advanced audio-visual and video components. By next year, Cheney said, he expects to offer some type of vodcasting content to students(The State Journal-Register (Springfield, IL), October 17, 2005).

 

457.                 voodoo programming n. Using program code written by someone else without understanding how the code works.

Technologies that hide complexity the way Core Data does can encourage ‘voodoo programming’, that most dangerous of programming practices where you include code in your application that you don’t necessarily understand. Sometimes that mystery code arrives in the form of a project template. Or, perhaps you download a utilities library that does a task for you that you just don’t have the time or expertise to do for yourself.

That voodoo code does what you need it to do. And you don’t have the time or inclination to step through it and figure it out, so it just sits there, working its magic…until it breaks (Apress, December 26, 2012).

 

458.                 voice portal n. A website that enables users to find and navigate to other websites by using voice commands.

Voice portals are in their infancy, but when they’re at their best, they allow you to navigate sites by voice alone, using both voice-recognition and voice-synthesis techniques. At their worst, they’re frustrating and can have comical foibles. For instance, one site interpreted a cough as a request for the weather in Beirut(ZDNet AnchorDesk, July 12, 2000).

 

459.                 voken n. An animated image that appears over a web page’s regular content and that, when clicked, takes the user to an advertisement or promotional site.

Surfers have learned to ignore banner ads or click past pop-up ads. But they often have no choice but to watch a growing number of new ads, which stream across their screens or block out portions of the Web pages they’re trying to view. These ads are designed so that they don’t leave the screen until the message has been delivered. 

Some obscure all or part of a page; others, when clicked on, transport surfers to sites they might not want to visit. 

These new ads take three forms: floating or flash ads, also known as vokens (short for virtual tokens), which feature animation, such as a car moving across a computer screen; interstitials, which are full-page billboards that pop up without the user requesting them; and full-page commercials (The Globe and Mail, April 5, 2002).

 

 

W

 

460.                 Walden zone n. A room or office that contains no electronic technology, particularly devices with Internet connections.

Retiring to the Walden zone for some deep breathing to energise the lungs, quick palming to refresh the eyes and calm meditation to quieten the mind, for a few precious moments in a day will leave you with that feeling of being pampered  (Deccan Herald, February 7, 2015).

 

461.                 WAPathy n. The general lack of interest in Wireless Application Protocol, the technology that enables web pages to be viewed on the latest generation of cell phones.

Most people have barely heard of WAP phones ‒ the mobiles which use a cut-down version of the Internet ‒ yet already there’s a new word to get used to: WAPathy. Instead of connecting to the latest technology, the early signs are that people are switching off. (The Guardian, July 8, 2000).

 

462.                 WAPlash n. The backlash against accessing the Internet using a WAP-enabled cell phone or other wireless device.

When the first WAP phones appeared early this year, many Wall Street analysts cheered. They called WAP the key to jump-starting e-commerce over mobile phones. They said WAP would make it easier to buy flowers, order books and check bank-account balances. WAPlash? By summer, a WAP backlash was well under way(Investor’s Business Daily, September 15, 2000).

 

463.                 war chalking Using chalk to place a special symbol on a sidewalk or other surface that indicates a nearby wireless network, especially one that offers Internet access.

Mr. Jones said by e-mail that he “had a light-bulb moment” after seeing architecture students ‘chalking up the pavement’ on his way to lunch. At lunch, Mr. Jones and a friend, who had recently been discussing hobo signs with another friend, came up with the notion, which Mr. Jones dubbed ‘war chalking’.  

War chalking derives from ‘war driving,’ a pastime of discovering wireless networks using widely available data-sniffing software that identifies open and restricted wireless nodes in homes and businesses. (War driving, in turn, comes from war dialing, modem-era hacker attempts to dial number after number to find modems). (The New York Times, July 11, 2002).

 

464.                 war dialing  A computer cracking technique that uses a software program to automatically call thousands of telephone numbers to look for any that have a modem attached.

The cell-phone hackers of the past, who electronically jimmied phones for the thrill and free phone service, have graduated to Web site hacking. Today, there are an estimated 440 hacker bulletin boards, 1,900 Web sites purveying hacking tips and tools, and 30 hackers publications like ‘Phrack’ and ‘2600: The Hacker Quarterly’. There are readily available software programs for hacking tactics like ‘war dialing’, ‘sniffing’ and ‘fingering’ — all used to exploit security weaknesses in computer systems (The New York Times, March 17, 2000).

 

465.                 war driving  A computer cracking technique that involves driving through a neighborhood with a wireless-enabled notebook computer and mapping houses and businesses that have wireless access points.

Do tech managers know where all their wireless LAN access points (AP) are? Since they can be plugged into a LAN and stashed almost anywhere, even by users, they can be a challenge to manage internally. Meanwhile, strangers can be discovering them be ‘war driving’ cruising around with a wireless-enabled laptop seeking wireless LANs that can be entered and explored (e-Business Advisor, August 1, 2002).

 

466.                 war texting pp. Using text messages to break into a remote system such as an automobile or a GPS tracking device.

Researchers at iSec Partners, a cybersecurity consultancy, have shown how a car’s wireless connections can be exploited, using a technique known as war texting, to break into a vehicle. Continuing to gather information about a car and maintain a two-way connection, some might argue, may leave owners vulnerable to new threats (The new York Times, September 22, 2011).

 

467.                 web bug A small, invisible image embedded into an HTML-

formatted email message or a website and used to track the activity of users who read the message or visit the site.

Invisible tags sometimes called Web bugs are widely used in HTML email by marketers and others to detect whether an individual has opened an e-mail message. The Congressional Privacy Caucus has announced plans to hold hearings to investigate the use of Web bugs later this month. Mr. Smith said that it was now clear that JavaScript could be used to create a more powerful Web bug so that not only can someone find out when a message is read, but also what is being said about it (The New York Times, February 5, 2001).

 

468.                 webcast wedding n. A wedding ceremony broadcast via streaming video over the web.

When Lori Dickinson and Tyson Reiser walk down the aisle on

Wednesday evening, most of their guests will be in pyjamas. The couple, from Waterloo, Ont., will say their vows in a Las Vegas chapel with 10 of their closest friends and family on hand. But another 40 or 50 people will be at home, watching the wedding live on the Internet after  Ms. Dickinson, 28, and Mr. Reiser, 30, sent out e-mail invitations for the Webcast wedding to family and friends in British Columbia, Calgary and Manitoba (The Globe and Mail, February 4, 2002).

 

469.                 web cramming n. A scam in which a person or small business accepts an offer for a free website, only to be subsequently charged a monthly fee on their phone bill.

The FTC said that in a web cramming case, one defendant, not immediately identified, will return more than $3 million to consumers  (The Vancouver Sun (British Columbia), November 1, 2000). 

 

470.                 webjack v. To redirect a legitimate website address to an illegitimate site.

It installed itself by taking advantage of a vulnerability in Internet Explorer 4.x and 5.x that lets an unsigned applet to create and use ActiveX controls. Then it hijacked Brandon’s browser, a term called ‘Web-jacking (Network World, January 26, 2004).

 

471.                 weblish n. A form of English peculiar to some online documents and communication, the characteristics of which include the use of all-lowercase letters, infrequent punctuation, errors in spelling and grammar, and an informal tone.

Just as the government is spending about Pounds 200m on a programme to reimpose the traditional rigour of literacy and numeracy, it also faces one of the greatest technological challenges to English. The internet and e-mail have already spawned their own words and grammar which has been dubbed ‘weblish(Sunday Times, May 13, 2001).

 

472.                 webology n. The study of the content, structure, and interconnections of the web.

I bought into all that webology; I loved the notion I was helping to create a parallel universe that would be a just and fairer world. I took a special delight in the architectural metaphor of the Net where you could surf into all kinds of places; you could go deep into the forest but always find your way back to your home page at the click of a button  (The Globe and Mail (Canada), January 4, 2003).

 

473.                 web rage n. Extreme anger caused by web frustrations such slow downloads, nonexistent links, and information that is difficult to find.

With literally millions of sites available, the time it takes to track down what you are after is often down to luck, rather than skill.

But, before you succumb to web rage or give up, take a look at a book out this week. The Good Web Guide To Money, by financial journalist David Emery, contains more than 100 reviews of the essential money websites, each site marked on a star system (out of five) for quality of information, speed, reliability, ease of navigation and design (The Guardian (London), May 27, 2000).

 

474.                 websumer n. A person who indiscriminately consumes information obtained via the web.

It would be OK if students saw the Internet as a delivery channel for information resources of various quality. But they don’t. They are ‘Websumers’ ‒ to them the Internet is a one stop shopping place where you can get information, even if you can’t (or don’t) distinguish between partial vs. complete, authoritative vs. dubious, biased vs. unbiased, old vs. current, or accurate vs. in accurate information( Computers in Libraries, May 1, 2001).

 

475.                 Web 2.0 n. A second phase in the evolution of the web where developers use new technologies to create websites that look and act like desktop programs and encourage collaboration and communication between users.

So what makes a startup part of the Web 2.0 club? It usually involves the company employing at least one of the following technologies or concepts: • Tagging: The seemingly simple idea of categorizing content has found a passionate following on the Web. Proponents say having people label content online is the best way to organize information; because it takes advantage of the collective wisdom of everyone online.

• RSS: It’s been likened to an online paperboy. Short for Really Simple Syndication, the technology allows users to have their favorite sites send content directly to them. Most blogs and news sites offer RSS feeds of their latest content. Feeds can be delivered to a personal Web page or accessed directly from a computer desktop with Web access. The technology has also fueled interest in audio content that has come to be called podcasting... • Web services: With broadband connections linking people to the Web as soon as they turn on their computer, the thinking goes that applications like word processing shouldn’t be stuck on desktops. Support for the idea has grown since Microsoft announced in November a strategy shift toward Internet-based services. Online-only versions of Windows and Office are on the way (The Seattle Times, December 19, 2005).

 

476.                 wedsite n. A website where a couple posts information about their upcoming or recent wedding.

FirstPhera is another name that thrives around the business of weddings, and is developed by Vikas Sabnani who started his venture a year ago in Ahmedabad. FirstPhera is into wedsites –websites that are used by the couple to invite friends and relatives, post pictures, and blogs related to pre and post wedding events. These wedsites also help clients share stories, and view posted greetings from friends’ and relatives’ (The Economic Times, November 7, 2008).

 

477.                 whack v. To access the data on a wireless network without authorization.

Most company computer networks are protected by a firewall. The firewall allows authorized users within the company to access the computer network. It also keeps out unauthorized users. But a wireless hacker – or whacker – can identify an unprotected wireless access point inside the company’s firewall, he can easily access it. Using free tools readily available on the internet, whackers could also crack through many protected access points (Chicago Sun-Times, July 21, 2002).

 

478.                 white-hat hacker n. A hacker who, upon discovering a vulnerability in a computer system, alerts the system vendor to the problem.

A piece profiles a group of white-hat hackers called Lopht, the Ralph Naders of the online world. They crack computer systems of companies and agencies to reveal their security holes. Crackees, including Microsoft, appreciate the warning (Slate Magazine, September 28, 2000).

 

479.                 whitelist v. To place a name, email address, website address, or program on a list of items that are deemed spam- or virus-free.

So how do we start fixing [spam]? Clearly, technical approaches are part of the solution. Apple and Microsoft have pretty good but far from flawless filters in their mail clients. Measures taken before the junk gets to the in box include ‘blacklisting’,  which blocks stuff from known spammers, and ‘whitelisting’, which permits only e-mail from preapproved senders  (Newsweek, February 24, 2003).

 

480.                 Wi-Fi n. A networking technology that creates a wireless connection between a device and a network or the Internet.

From the home, we move to public access spaces. Working with companies like Wayport, MobileStar, and Airwave, hundreds and hundreds of airports, hotels, and even restaurants are rolling out Wi-Fi access. On Jan. 3, Starbucks and Microsoft announced that in early spring each coffeehouse would begin offering Wi-Fi access for its patrons (Fortune, March 5, 2001).

 

481.. Wi-Fi squatter n. A person who lingers in a public location to use its Wi-Fi internet connection, or who uses such a connection without authorization.

Café owners have tried a variety of tactics to foil Wi-Fi squatters. They put out signs that ask laptop users to share tables or point them to nearby Wi-Fi hot spots such as public libraries (Los Angeles Times, August 8, 2010).

 

482.                 wiielbow n. Elbow pain or numbness caused by excessive use of the

Wii gaming console’s remote control.

Ismaili says his brother and a friend collapsed onto a couch, exhausted, a minute into a round of Wii boxing.

‘The Wii gives you one good workout’, says Ismaili.’Both guys were sore the next day’.The soreness and joint pain has become common enough that gamers have coined the term ‘Wiielbow(The Toronto Star, December 3, 2006).

 

483.                 wiki n. A collaborative website that allows users to add, edit, and delete the site’s content; the software that enables such collaboration.

Another Internet site that served as an information clearinghouse, with at least five million page views, was the KatrinaHelp Wiki (katrinahelp.info). This effort (a “wiki” is a site that anyone can add to and edit) was started by 20 volunteers around the world who had worked on a similar site after the tsunami in South Asia, according to a co-founder, Rob Kline of Seattle. 

The wiki first focused on its PeopleFinder database (a technology eventually adopted by Google) and then on ShelterFinder, one of the few comprehensive lists of shelter information available. More than 4,000 “editors” worked on data entry. The wiki also acted as host for Help Needed and Help Offered forums similar to Craigslist’s (The New York Times, November 14, 2005).

 

484.                 wikiality n. Reality as defined by a consensus, particularly in a collaborative endeavor such as Wikipedia.

For one thing, ‘wikiality’ a Stephen Colbert-inspired “word of the year,” is a password that signals you are an irony insider. But beyond that, the wiki website model, popularized by Wikipedia, is also emerging as a hot business tool (U.S. News & World Report, August 28, 2006).

 

485.                 wikification n. The process of opening online content to allow for collaboration from users; to turn an online site into a wiki.

The thinking went something like this: Chevrolet is all about being revolutionary, right? (That’s debatable, but since Chevy’s tagline is ‘An American Revolution!’  this is where all discussion starts at its ad agency.) And if Chevrolet is revolutionary, then its advertising ought to be, too. Ergo, the Chevy message needed to escape the tightly controlled, painstakingly monitored, woefully predictable confines of the 30-second TV spot and roam the online jungle. But everybody’s doing that now. So, Chevy marketers thought, let’s take this thing a notch further — let’s have an online contest to see who can create the best TV ad for the new Tahoe. The wikification of the 30-second spot — what could be more revolutionary than that? (Wired, December 1, 2006).

 

486.                 Wikigroaning n. The practice of locating two similar Wikipedia articles, one useful and the other relatively frivolous, where the frivolous article is substantially longer and more involved than the useful article. There’s a new sport on the Internet: competing to come up with the best examples of how Wikipedia, the Web’s home-grown reference source, is skewed towards pop-culture topics. For instance, the West Wing of the White House merits a 1,100-word entry on Wikipedia, while ‘The West Wing’, the Aaron Sorkin TV drama, has an 6,800-word write-up. This game already has a name: ‘Wikigroaning  (The Wall Street Journal, June 16, 2007).

 

487.                 Wikipedia kid A student who has poor research skills and lacks the ability to think critically.

Pressure from Queen’s Park to increase high school graduation rates has led to a generation of ‘Wikipedia kids’ who are not prepared for university, a survey of professors and librarians has concluded.

Students are immature, they rely too heavily on Internet tools such as Wikipedia as research sources, they fail to learn independently and they expect success without putting in the effort (Ottawa Citizen, April 8, 2009). 

 

488.                 Wintel n. A computer with an Intel microprocessor running the Windows operating system and software.

Intel, on the other hand, is spruiking its new Viiv technology (www.intel.com/products/viiv). This promises to deliver on-demand digital entertainment via the internet, as well as the ability for families to view, manage and share music, photos and movies. You’ll also be able to record your favourite TV shows on a PC running with Viiv. This sounds awfully close to what Microsoft is trying to achieve. Expect some bloodied noses behind the scenes as both technology giants vie for branding dominance in the home entertainment space and the Wintel marriage of convenience begins to disintegrate (The Age (Australia), January 14, 2006).

 

489.                 word-of-blog n. Communication that occurs via blogs.

Just like the Web itself, blogs — more than 70 million by one count — have moved from their pioneer days to a more mature phase where they command respect and huge mainstream followings.

Gillin argues that, rather than adding up to a vast wasteland, the addition of each new blogger improves the quality of discourse.

No longer will 30-second TV ads reach the right audiences. ‘Word-ofblog’ is the new word-of-mouth(The Seattle Times, May 21, 2007).

 

490.                 word-of-mouse n. Communication via computer-based means, such as email, chat rooms, or newsgroups.

Given the clutter on the Internet, ‘how will people find it?’ said Tom Beeby, creative director at Modem Media in Connecticut, an agency that specializes in Internet advertising. ‘They are trying to generate word-ofmouse, but I am skeptical’. (Los Angeles Times, September 18, 2000).

 

491.                 word-of-post n. Gossip and news spread by online posts, particularly via social media or blogs.

We’ve known for years that word-of-mouth marketing has been partially co-opted by word-of-post, but the power of that lesson continues to impress when words like Grey (as in Fifty Shades) cease to instantly invoke Goose, sky or sweaters(Forbes, October 16, 2012).

 

492.                 workshifting pp. Using portable devices and wireless technologies to perform work wherever and whenever it is convenient.

Trends such as IT consumerization, worker mobility, cloud computing and workshifting mean that more people are accessing enterprise desktops, applications and data from more places and in more ways than ever before (The CTO Forum, December 21, 2011).

 

 

Y

 

493.                 yotabytte n. 2 to the power of 80 — approximately 10 to the power of 24 — bytes, or a million trillion megabytes.

Now that kilo-, mega-, and even gigabytes of computer memory don’t seem like much any more, and computer clock speeds of nanoseconds seem blase, here’s what to expect in the near future: Computers with yottabyte memories, operating at zeptosecond clock speeds. Government deficits of petabucks (The Vancouver Sun, May 16, 2006).

 

494.                 Y2K leap year bug n. A computer problem involving software that has been programmed incorrectly to treat  the year 2000 as a non-leap year.

Just when you thought it was safe to log on, here comes the dreaded Y2K Leap Year Bug. CERT – the respected Computer Emergency Response

Team, based at Carnegie-Mellon                University ‒ has issued an advisory on how some computers will mistake Feb. 29 for March 1 (USA Today, January 5, 2000).

 

 

Z

 

495.                 Zen mail n. An incoming email message without any body text or attachments.

A mysteriously blank e-mail which arrives without any body copy and no attachments (The Sunday People, May 26, 2002).

 

496.                 zenware n. Software designed to enhance focus by removing or blocking a computer’s visual distractions.

Their inventions so far include wearable sensors that deliver rewards

(‘calm points’) for breathing well while you work, developed by Stanford University’s calming technology laboratory;…and scores of pieces of ‘zenware’ designed to block distractions, with names such as Isolator and StayFocusd and Shroud and Turn Off The Lights  (The Guardian, May 10, 2013).

 

497.                 zero-day adj. Relating to a computer security vulnerability that is exploited before the vulnerability is known to security experts; relating to information obtained or discovered before it is publicly available.

Security and vulnerability tracking companies’ reactions were more dramatic: they immediately raised alert levels, both because the flaw was an unpatched ‘zero-day bug, and also because exploits were already out and about. Danish security company Secunia, for instance, tagged the new flaw as “Extremely critical,” its highest warning; Symantec, meanwhile, gave it a rating of 9.4 on its 10-point scale for vulnerability alerts (InformationWeek, December 28, 2005).

 

498.                 zombie car n. A car that starts itself randomly; a car with a computer system under the control of a malicious hacker; an abandoned car.

Plus, so-called zombie cars that run the risk of starting themselves when you least expect. We have details of a major recall (CNN Transcripts, March 7, 2013).

 

 

Numerically-Alphabetic Words

 

 

499.                 419 scam (419 fraud 419 scheme 419 con ) A fraud, particularly one originating in Nigeria, in which a person is asked for money to help secure the release of, and so earn a percentage of, a much larger sum.

There was, of course, no $21.5 million. Sessions, a 73-year-old retired electronics specialist, had been fleeced by what may be the most widespread fraud on Earth.

He had poured more than $300,000 into a Nigerian 419 scam, the label describing the legendary e-mails that promise millions but deliver nothing ( Orlando Sentinel, December 23, 2003)

 

500.                 2038 bug  A computer software bug that will cause programs to cease functioning properly when confronted with dates in the year 2038 and beyond.

So let’s quickly examine another doomsday lurking in our not-so-distant future: that in 30 years’ time, the internet will stop working. Or at least, the bits of it that run on Unix. (For once, this is a tale where Microsoft comes out looking well-prepared.)

This is down to what’s being called the ‘2038 bug’. It arises because Unix-based systems store the time as a signed 32-bit integer, in seconds, from midnight on January 1 1970. And the latest time that can be represented in that format, by the Posix standard, is 3.14am on January 19, 2038. (It’s a Tuesday. Better make sure your desk is clean on the Monday night). (The Guardian (London), March 13, 2008).

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ

 

1.   Андрусяк І. В.  Англійські неологізми кінця ХХ століття як складова мовної картини світу : автореф. Дис. … канд. Філол. Наук : спец. 10.02.04 / Ірина Василівна Андрусяк. ‒ К., 2003. ‒ 20 с.

2.   Глазырина А. И. Компьютерный подъязык: термины, жаргонизмы, профессионализмы / А. И. Глазырина. ‒ Вестник Челябинского государственного университета. Филология. Искусствоведение. ‒ 2013. ‒ Вып. 82. ‒ С. 77-80.

3.   Зацний Ю. Соціолінгвальні параметри інновацій англійської мови ХХІ століття / Ю. Зацний, А. Янков // Нова філологія : [зб. Наук. Пр. / гол. Ред. В. М. Манакін]. – Запоріжжя, 2008. – Вип. 31. – С. 72‒88.

4.   Ільченко О. М. Антропоцентризм комп’ютерних неологізмів: лінгвокогнітивний аспект / О. М. Ільченко // Наукові записки Вінницького державного педагогічного університету ім. М. Коцюбинського. – Вінниця, 2003. – № 6. – С. 406‒409.

5.   Какорина Е. В. СМИ и интернет-коммуникация (области пересечения и проблемы взаимодействия) / Е. В. Какорина // Язык современной публицистики. – [2-е изд., испр.]. – М. : Флинта : Наука, 2007. ‒ С. 67‒98.

6.   Кармызова О. А. Компьютерная лексика: cтруктура и развитие : дис.

… канд. Филол. Наук: 10.02.19 / Ольга Андреевна Кармызова. – Воронеж, 2003. ‒ 217 с.

7.   Кизиль М. А. Английские метафорические термины Интернет-сферы / М. А. Кизиль // Языковые категории и единицы: cинтагматический аспект. Материалы XI Международной научной конференции (Владимир, 29 сентября ‒ 1 октября 2015 года). ‒ Владимир: Транзит-ИКС, 2015. ‒ С. 195‒197.

8.   Кизиль М. А. Прагматические особенности функционирования и использования компьютерной терминолексики английского языка / М. А. Кизиль // Язык и культура. Научный журнал.  ‒ № 13. ‒ Кутаиси: Изд-во «Джоржоба», 2015. ‒ С. 68‒70.

9.   Кізіль М. А. Функціонування англійськомовних лексичних інновацій сфери комп'ютерних технологій / М. А. Кизиль // Економіка, наука, освіта: інтеграція та синергія: матеріали міжнародної науково-практичної конференції (Братислава, 18-21 січня 2016 року).: у 3-х т. ‒ Т. 3. ‒ К. : Вид-во «Центр навчальної літератури», 2016. ‒ С. 22.

10.             Махачашвілі Р. К. Категоризація віртуального  утя: проблема комп'ютерного терміна (на матеріалі сучасної англійської мови) / Р. К. Махачашвілі // Актуальні дослідження іноземних мов і літератур : матеріали міжвуз. Наук. Конф. Молодих учених, 13-14 лют. 2003 р. – Донецьк, 2003. – 

С. 198–200.

11.             Махачашвілі Р. К. Лінгвоонтологічні параметри неотехносфери сучасного  утя / Р. К. Махачашвілі // Нова філологія. – Запоріжжя, 2007. – №

27. – С. 97‒104.

12.             Barnhart K. D. Prisez and Pitfalls of Computerized Searching for New Words for Dictionaries / K. D. Barnhart // Dictionaries. – 1985. – V. 7. – P. 253-260.

13.             Biocca F. Communication in the Age of Virtual Reality / F. Biocca. – N. J. : Lawrence Erlbaum Associates, 1995. – 356 p.

14.             Davis S. Click on Democracy. The Internet Power to Change Political Apathy into Civic Action / S. Davis. – Boulder, Colorado : Westriver Press, 2002. – 395 p.

15.             Whittaker J. The Cyberspace Handbook / J. Whittaker. – L. : Routledge, 2004. – 322 p.

 

 

СПИСОК ДЖЕРЕЛ ЛЕКСИКОГРАФІЧНОГО МАТЕРІАЛУ

 

16.             Зацный Ю. А. Англо–русский словарь новых слов и cловосочетаний (рубеж столетий) / Ю. А. Зацный. – Запорожье: Запорожский государственный университет, 2000. – 243 с.

17.             Blanton A. Microsoft Computer Dictionary: [5-th ed.]  / A. Blanton. – Washington, Redmond : Microsoft Press, 2002. – 638 p.

18.             Collins Cobuild Advanced Learner’s English Dictionary / [Editor- in- Chief John Sinclair]. – New York : HarperCollins Publishers, 2008. – 1768 p.

19.             Downing D. Dictionary of Computer and Internet terms: [10-th ed.] / D. Downing. – Covington: Melody Mauldin Covington, 2009. – 554 p.

20.             McFedries P.  The Word Spy / [Електронний ресурс]  – Режим доступу : http://www.wordspy.com

21.             Pfaffenberger B. Webster’s New World Dictionary of Computer: [10 ed.]  / B. Pfaffenberger. – Indiana : Wiley Publishing Inc., 2003. – 432 p.

22.             Schell B.  Webster’s New World Hacker Dictionary / В. Schell, M. Clemens. – Indiana : Wiley Publishing Inc., 2006. – 387 p.                  

23.             Reitz J. M. Dictionary of Library and Information Science / J. M. Reitz. – Westport, CT : Libraries Unlimited, 2004. – 790 p.

24.             Soanes C.  Pocket Oxford Dictionary of English (PODE) / C. Soanes, S. Hawker, J. Elliott.   ‒  Oxford : Oxford University Press, 2005. – 1081 p.

25.             Webster’s Third New International Dictionary [unabridged] (WTNID) : [ed. By Philip Babcock Gove]. – Springfield, Massachusetts : Merriam Webster, 2002. – 2662 p.

26.             Weik M. Computer Science and Communications Dictionary / M. Weik. –N. Y. : Springer, 2000. – 2006 p.

27.             World Wide Words MacMillan Dictionary [Електронний ресурс]. – Режим доступу: http://www.macmillandictionary.com

 

СПИСОК ДЖЕРЕЛ ІЛЮСТРАТИВНОГО МАТЕРІАЛУ

 

28.             Accounting Today, 2003.

29.             Arkansas Democrat Gazette, 2006.

30.             The Atlantic, 2010.

31.             Austin American-Statesman, 2003.

32.             The Boston Globe, 2001.

33.             Business Today, 2009.

34.             Business Wire, 2000.

35.             Calgary Herald (Alberta, Canada), 2000.

36.             Canwest News Service, 2008.

37.             The Birmingham Post, 2007.

38.             The Capital, 2006.

39.             Chicago Sun-Times, 2005.

40.             The Christian Science Monitor, 2001‒2006.

41.             The Chronicle of Higher Education, 2003.

42.             Computerworld, 2005.

43.             Сomputers Today, 2000.

44.             Daily Record, 2000.

45.             The Daily Telegraph, 2008.

46.             The Dallas Morning News, 2000 ‒ 2001.

47.             Deccan Herald, 2015.

48.             Denver Westword, 2003.

49.             The Economist, 2001 ‒ 2010.

50.             Europemedia.net, 2002.

51.             Financial Times (London), 2000.

52.             Forbes, 2015.

53.             Fort Worth Star Telegram, 2003.

54.             The Globe and Mail, 2003.

55.             The Guardian, 2002 ‒ 2014.

56.             Guardian Weekly, 2000.

57.             The Globe and Mail, 2003 ‒ 2011.

58.             The Hamilton Spectator, 2002.

59.             The Herald Tribune, 2010.

60.             Hindustan Times, 2008.

61.             Home Office Computing, 2000.

62.             The Honeycombers, 2014.

63.             IEEE Transactions on Computers, 2000.

64.             Independent Extra, 2008.

65.             Inside.com, 2001.

66.             Information Week, 2004 ‒ 2011.

67.             InfoWorld,  2000 ‒ 2001.

68.             Journal of Commerce, 2000.

69.             The Korea Times, 2014.

70.             Lincoln Journal Star, 2008.

71.             Maclean’s, 2002.

72.             McFarland, 2007.

73.             NBC News, 2013.

74.             Network News, 2001.

75.             Newsweek, 2000 ‒ 2005.

76.             New Scientist, 2001.  

77.             New Straits Time, 2000.

78.             New York Observer,  2001.

79.             The New York Times, 2001 ‒ 2015.

80.             New Straits Time, 2000.

81.             PCQuest,  2013.

82.             PC Magazine, 2000 ‒ 2007.

83.             Quartz, 2014.

84.             The Scotsman, 2013.

85.             The Southland Times, 2002.

86.             Sunday Herald Sun, 2009.

87.             TalkBass, 2009.

88.             Technical Communication, 2004.

89.             Technology Review, 2002 ‒ 2006.

90.             The Toronto Sun, June 16, 2007.

91.             USA Today, May 6, 1998 ‒ 2008.

92.             U.S. News & World Report,  2006.

93.             Utne,  2003.

94.             The Vancouver Sun (British Columbia), 2000.

95.             The Verge, 2015.

96.             The Wall Street Journal, 2000.

97.             Washingtonian, 2000.

98.             The Washington Post, 2001 ‒ 2007.

99.             Windows Networking, 2011. 100. Wired News, 2005 101. Wired, 2007.

102.  Wired Science, 2012.

103.  The Wired Test, 2006.


 

 

 

Навчальне видання

 

 

 

 

 

Кізіль Марина Анатоліївна

 

 

 

ІННОВАЦІЙНІ ОДИНИЦІ АНГЛІЙСЬКОЇ МОВИ 

СФЕРИ КОМП'ЮТЕРНИХ ТЕХНОЛОГІЙ 

XXI CТОЛІТТЯ

 

 

 

Лінгвістичний словник

 

 

 

 

 

 

 

 

 

Редактор, оригінал-макет – А.В. Самотуга

Дизайн – В.А. Ситник

 

 

 

 

image

Підп. до друку 31.05.2017. Формат 60х84/16. Друк трафаретний. Папір офісний. 

Гарнітура Times. Ум.-друк. арк. 7,75. Обл.-вид. арк. 8,00.  Зам. № 03/17-нп. Наклад 50 прим. 

image

Редакційно-видавниче відділення 

Дніпропетровського державного університету внутрішніх справ

49005, м. Дніпро, просп. Гагаріна, 26, тел. (056) 370-96-59

Свідоцтво суб’єкта видавничої справи ДП № 164-р від 07.08.2013

ПП «Ліра ЛТД»

49038, м. Дніпро, вул. Наукова, 5, тел. (056) 731-96-57

Свідоцтво суб’єкта видавничої справи ДК № 188 від 19.09.2000 р.

pdf
Додав(-ла)
Кізіль Марина
Додано
28 листопада
Переглядів
147
Оцінка розробки
Відгуки відсутні
Безкоштовний сертифікат
про публікацію авторської розробки
Щоб отримати, додайте розробку

Додати розробку