Showing posts with label IT Jargon. Show all posts
Showing posts with label IT Jargon. Show all posts

Sunday, November 15, 2015

IT Jargon: B2C

Business-to-Consumer (B2C)

Business-to-consumer (B2C) is an Internet and electronic commerce (e-commerce) model that denotes a financial transaction or online sale between a business and consumer. B2C involves a service or product exchange from a business to a consumer, whereby merchants sell products to consumers.

B2C is also known as business-to-customer (B2C).

A business that sells online merchandise to individual consumers is categorized B2C. Experts have suggested that online B2C activities played a vital role in shaping the Internet, despite the dotcom bubble burst in the late 1990s. While many online B2C business websites shut down at that time, an electronic customer surge occurred shortly thereafter, which helped catapult e-commerce activities. Companies took advantage of this by creating electronic storefronts after discovering they could sell larger volumes of merchandise through B2C models.

IT Jargon: B2G

Business-to-Government (B2G)

Business-to-government (B2G) is a business model that refers to businesses selling products, services or information to governments or government agencies.

B2G networks or models provide a way for businesses to bid on government projects or products that governments might purchase or need for their organizations. This can encompass public sector organizations that propose the bids. B2G activities are increasingly being conducted via the Internet through real-time bidding.

B2G is also referred to as public sector marketing.

Governments are contained within the federal, state and local arenas. Governments typically work with prenegotiated contracts and they've usually vetted out contractors they've used before or for whom there are standing contracts that might be grandfathered in. Types of B2G techniques called integrated marketing communications encompass Web-based communications as well as strategic public relations and electronic marketing.

Government bids are solicitations that originate from businesses that have something a government needs. The solicitations may be in the form of reverse auctions where sellers are competing to obtain business. The American Recovery and Reinvestment Act of 2009 has spurned the use of B2G.

Social platforms such as LinkedIn, Facebook and Twitter can be part of this vertical market, although businesses largely neglect this form of B2G selling. Businesses can provide documents such as a "Statement of Capabilities" which outlines the abilities, products and services of a company that wishes to contract with government agencies. This document will frequently accompany a "Proposal of Service" that can be supplied when submitting contract bids.

IT Jargon: Gorilla Arm


What does Gorilla Arm mean?


“Gorilla arm” is when someone who is using a vertical or standing touchscreen experiences fatigue or their arm starts to hurt, because of the awkward and not very ergonomic positioning that is required. It is called "gorilla arm" because of the similarity to the way a gorilla or other primate might interact with these vertical screens. Understanding gorilla arm and its use in the context of ergonomics reveals a lot of design elements that have driven new consumer products like tablets, two-in-one laptops, and other kinds of new touchscreen devices.

Gorilla arm is also known as gorilla arm syndrome.

Gorilla arm is what happens when the user interacts with a vertical touchscreen for a long period of time. The arm becomes tired, and it becomes more difficult to interact with the interface. One excellent example is the use of a floorstanding kiosk, the kind you might find in an airport library. Short-term use is relatively easy for most users — but as time goes on, the burden of raising the arm and making selections causes a certain kind of fatigue, since the arm is not physically supported in any way.

It might seem like a small detail, but the gorilla arm phenomenon has driven specific design elements in the most popular user devices on the market. For example, Apple does not include unsupported touchscreen technology for its devices because of user research on gorilla arm. So this term actually has a lot to do with how people physically interact with others on the Internet, or over other networks.

IT Jargon : Google Stalking


What does Google Stalking mean?


“Google stalking” is a term for looking up in-depth information on someone using the Google search engine on the Internet. Because Google is the predominant search engine that most Web surfers use, Google stalking has come synonymous with getting basic online research on a person, or on any other kind of topic or subject.

One of the tricky points about Google stalking is the ethics involved. In general, there is no ethical standard for Internet search. However, some people argue that Google stalking may run counter to certain forms of "netiquette" or Internet etiquette that some people think should be practiced online.

Google stalking can also come in many different forms. In some cases, people are just looking for images or clues to someone's appearance. In other cases, they may be acquiring background information or demographic information such as age, marital status and other personal indicators. In a lot of cases, it is possible to build a much more detailed portfolio of information on someone including current and past addresses and phone numbers, criminal background and family history, as well as a thorough survey of that person's hobbies and personal preferences. Because Google is a public tool, and there are few restrictions on its use, Google stalking is generally seen as something that is an accepted way to gather information about someone.

Saturday, November 14, 2015

IT Jargon: Black Hat SEO


Black Hat Search Engine Optimization 




Black hat search engine optimization (SEO) refers to controversial SEO methods used to acquire higher Web page search engine rankings. Black hat SEO is often described as a search engine algorithm gaming technique. It makes use of aggressive techniques and procedures which are only aimed at search engines and do not consider a website's human audience. Black hat SEO methods are usually considered unethical.

In the early days of SEO, many black hat SEO techniques were considered legitimate – although a bit aggressive. These techniques have since been abandoned as search engines have released clearer SEO guidelines. Although several black hat SEO techniques work effectively, they mostly offer short-term gains.

Examples of black hat SEO methods include:

  • Keyword Stuffing: Loading extensive keyword lists into alt tags, metatags, and comment tags in text that is invisible to human eyes. This repeated flooding of exactly the same keywords within a Web page is designed to trick search engine algorithms, which read the keywords and rank the Web page high in their search results.
  • Link Building/Farming: Posting a website URL to a site that consists of a link directory with many links to other websites with completely unrelated content.
  • Doorway Pages: These pages are indexed by the search result. However, when users enter a doorway page, they are redirected to an unrelated Web page.
  • Invisible/Hidden Text: Inserting long lists of white-text keywords into a white background. This technique is considered spam, which can cause search engines to ban those who use it.


The definition of black hat SEO is meaningful in contrast to white hat SEO. Search engines are geared toward directing users to websites that most appropriately match their queries. Metadata, tags, headers, inbound links and other data factor into search engine results and hierarchies. White hat SEO focuses on strengthening data point accuracy to fully reflect Web page search content results. Black hat SEO techniques are used in an attempt to trick search engines into directing users to a page that appears to answer or match user search queries, but may in fact contain unrelated content.

Search engines algorithms have adjusted to nullify basic black hat SEO techniques such as keyword stuffing. In certain extreme cases, search engines may lower the offending page's rank or delete the offender from search results.

IT Jargon: Baby Boomer Compatibility



Baby boomer compatibility is a slang term for the pressure placed on technology companies to produce usable and understandable devices targeted to the baby boomer generation. In the U.S., baby boomers are the largest and most easily identified demographic, and more importantly, currently hold a large amount of wealth. Thus, tech firms are driven to market and sell to such a large market. However, baby boomer compatibility is a common issue, as this particular generation is less technologically literate than its successors.

Baby boomers tend to get a bad rap for their inability to adjust to changing technology. To be fair, most baby boomers came of age in the 1960s, and what we consider to be modern technology – personal computers, the Internet and cellphones, etc. – was not commercially available until the 80s and 90s - a point when boomers were approaching midlife and, generally, less likely to have an interest in, or knack for, cutting edge technology.

Because of the rich market represented by boomers, tech producers make a concerted attempt to create products that are compatible with the baby boomer generation. Some of these solutions are elegant, such as touch interfaces, larger display fonts and so on. Just as often, however, the end result is a ham-fisted dumbing down of a product that reduces functionality more than it increases compatibility.

Monday, November 9, 2015

IT Jargon: Backsourcing


What does Backsourcing mean?



Backsourcing is the arduous process of termination or expiration of an IT outsourcing contract that initiates the process of re-establishing IT operations in-house. This process has direct costs of operational disruption and penalty fees associated with indirect costs of damaging an organization's reputation and relationships with customers, employees, investors and corporate partners.

This term is also known as, or mis-spelled as, back-sourcing or back sourcing.

The risks associated with backsourcing have caused some outsourcing organizations to have their customers sign pre-nuptial backsourcing agreements clearly describing the terms and conditions under which a contract may be terminated and the control of IT functions may be brought back in-house.

For establishing effective backsourcing process, it is essential to make sure that organizations continue to perform operations even though their outsourcing arrangements get failed.

Sunday, November 8, 2015

IT Jargon: Imaginary Internet Points

Imaginary Internet Points

The term “imaginary Internet points” has become a shorthand way to talk about the soft values that people get from various kinds of online interactions where other users may like, upload or otherwise support content online. "Imaginary Internet points" are conceptual "points" obtained through digital user activity.

In the digital era, the term “imaginary Internet points” has developed as a way to reference intangible value. One example is on the  social media platform Facebook, where Facebook “likes” have become a quick and easy way for someone to signal support, agreement, amusement or other kinds of emotional interaction.

These Facebook “likes” have come to have value that is in some ways a concrete value. Businesses might talk about putting a value on Facebook “likes.” The same indications might have significant social value to individual users.

Friday, November 6, 2015

IT Jargon: Blaudience

Blog Audience (Blaudience)

A blog audience is a loyal group of people who visits and returns to a blogger’s site. Developing a true audience – as opposed to gaining unique visits through search-engine optimization – is a tall order for bloggers as Internet users tend to have variable tastes.

Most successful blogs have a few key attributes that help them maintain and continue to grow a loyal audience. High-quality content that is relevant to the group of people the blog aims to target is the most important factor.




However, for new bloggers, attracting that group of people may involve some of the following strategies:

  • Listing blogs on targeted blog directories
  • Answering questions and commenting in relevant online forums
  • Promoting work over social media
  • Guest posting on more prominent bloggers’ sites
  • Using plug-ins and site features to expand the blog’s reach, such as those that provide connectivity to social media, implement RSS feeds or provide in-depth analytics for the blog

IT Jargon: BSoD

Blue Screen of Death (BSoD)




Blue screen of death (BSoD) is a Microsoft Windows operating system error screen that is displayed to indicate system conflicts and the potential for a crash. This term gets its name because these critical messages were displayed on a blue screen.

Enough Said !

IT Jargon: Big Mother


Big Mother is a slang term that refers to modern technology that parents can use to monitor their children. The range of Big Mother technology is quite large. Some examples include:

  • Geolocation
  • Cell phone spy software
  • Nanny cams
  • Purchase tracking software
  • Car chips and cameras


    Big Mother is that Orwellian vision with a parental twist. While this technology does put anxious parents at ease, it also tests boundaries beyond the parent-child relationship. One example is how geolocation data can be used to check whether another adult who is driving a child somewhere is speeding while the child is in the car. Dads seem not be interested.

Thursday, November 5, 2015

IT Jargon: Alpha Geek


Alpha Geek


Alpha geek is a slang term for the most tech savvy person within a group. Once identified, an alpha geek becomes the go-to for all problems, issues and advice when it comes to technology. 

An especially tech savvy alpha geek may be called a geek’s geek or the head geek. Essentially, this is the person that tech geeks go to when they have a problem.

Although it is a tongue-in-cheek way of describing someone with more technological expertise than everyone else, alpha geeks serve several important functions. First, they are usually mavens within their groups, meaning that the technologies they adopt and endorse are likely to spread through their networks. Two, alpha geeks within an office or business that is not traditionally tech-based can help find solutions that fit that particular business. Having the alpha geek vote can make a huge difference for companies selling technology to the public or business.

Wednesday, November 4, 2015

IT Jargon: Acqhire

What does Acqhire mean?

Acqhire is a neologism created from a combination of the words acquire and hire that is used to refer to one company's acquisition of another in order to gain talented employees.

Acqhiring is common in the tech world, where large tech companies often purchase startups to gain access to a cool concept - and the expertise of the people who created it.
Acqhire is also known as acquihire and, less commonly, acquhire. The term may be hyphenated as acq-hire or even acqui-hire.

IT Jargon: App Economy

What does App Economy mean?

App economy refers to the range of economic activity surrounding mobile applications. Mobile apps created new fortunes for entrepreneurs and changed the way business is done. The app economy encompasses the sale of apps, ad revenue or public relations generated by free apps, and the hardware devices on which apps are designed to run. 

In 2007, virtually no mobile apps existed. As of 2011, more than 25 billion apps have been downloaded.
Apps are also effecting a shift for online businesses, which are often accessed through an app on a mobile device, rather than over the Web. As a result, websites that get most of their revenue through online ads have had to consider what apps mean to their business model.

IT Jargon: ABM

What does Anything But Microsoft (ABM) mean?

Anything but Microsoft (ABM) refers to an attitude that reflects the general discontent with Microsoft's domination in certain markets. 

The anything-but-Microsoft mindset has been encouraged by vendors that offer alternatives to popular Microsoft products. Microsoft has had many dominant products, including its server software, Windows operating software, Microsoft Office and Internet Explorer.
Anything but Microsoft may also be referred to as anyone but Microsoft

IT Jargon: ABEND

Absent by Enforced Net Deprivation (ABEND)


Absent by enforced net deprivation (ABEND) is a term used by an individual to inform friends or acquaintances that they will be unavailable or offline due to lack of Internet/network connectivity. This may occur when a user is traveling, moving or ill, among other reasons.
ABEND was initially a hacker slang jargon used on USENET groups. Typically, the term ABEND was sent as the subject of an email. It was sent as an acronym so that only limited, like-minded or knowledgeable hackers could decipher the message. As a result of this abbreviation, people can easily tell their friends that they won’t have access of Internet. The term also implies that those who use it wouldn't go offline for any other reason than an insurmountable lack of Internet access
.



.