Stands for Universal Integrated Circuit Card. A UICC is a smart card designed to operate with 3G and 4G wireless technologies, including LTE. It can be used for multiple applications, but is commonly used as a SIM card in mobile phones. UICCs have mostly replaced ICCs (Integrated Circuit Cards), which were used with 2G and early 3G systems.
A UICC is a tiny card, smaller than a thumbnail, that includes an integrated circuit. This circuit contains a processor, non-volatile memory (NVRAM), ROM, and RAM. Each card has a unique identifier that is used to identify a device on a cellular network. The card may also store data, such as contacts that have been saved by the user. While there is no standard storage capacity for UICCs, they commonly have at least 256 kilobytes of storage and may exceed one gigabyte.
UICCs are universal since a single card supports multiple applications and therefore multiple cellular networks. Examples include USIM (Universal Subscriber Identity Module) for GSM networks, CSIM (CDMA Subscriber Identity Module) for CDMA networks, and ISIM (IP Multimedia Services Identity Module) for UMTS networks. The universal nature of UICCs allow them to work with various mobile networks around the world.
NOTE: In order to use a UICC, the cards unique identifier (the ICC ID) must be registered and activated with a mobile service provider. Removing the card from a smartphone or other cellular device will make the device unrecognizable on the network. In most cases, if you insert the UICC card in another device, it will be automatically be recognized and usable on the network.
UICC card from an iPhone 7
Unregistered UICC SIM card
Posts made by Ernesto
-
UICC
-
Trojan Horse
In Greek mythology, there is a story about the Trojan War. This war lasted many years, as the Greeks could not penetrate the heavily barricaded city of Troy. So one day, a few of the Greek soldiers brought the people of Troy a large wooden horse, which they accepted as a peace offering. The horse was moved inside the city walls, where it sat until the night. After the people of the city had fallen asleep, Greek soldiers jumped out of the wooden horse, opened the gates to let their fellow soldiers in, and took over the city.
So what is the moral of this story? Mainly, beware of Trojan horses. But how does that relate to computers? Thats a good question. In the computing world, Trojan horses are more than just a myth. They really exist and can cause damage to your computer. Trojan horses are software programs that masquerade as regular programs, such as games, disk utilities, and even antivirus programs. But if they are run, these programs can do malicious things to your computer.
For example, a Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data. While this is certainly something you want to avoid, it is good to know that these malicious programs are only dangerous if they are given a chance to run. Also, most antivirus programs can catch Trojan horses when scanning for viruses. Unlike viruses, however, Trojan horses dont replicate themselves. Though it is possible for a Trojan horse to be attached to a virus file that spreads to multiple computers.
So as a general rule, dont open a program unless you know it is legitimate. This applies especially to e-mail attachments that are executable files. Even if you are pretty sure the attachment is OK, it is still a good idea to run it through your virus scan program (with the latest virus definitions) just to be safe. Remember what happened to the people of Troy -- dont let a Trojan horse catch you off guard. -
null
Stands for Thin Film Transistor. These transistors are used in high-quality flat panel liquid-crystal displays (LCDs). TFT-based displays have a transistor for each pixel on the screen. This allows the electrical current that illuminates the display to be turned on and off at a faster rate, which makes the display brighter and shows motion smoother. LCDs that use TFT technology are called active-matrix displays, which are higher-quality than older passive-matrix displays. So if you ever see a TFTAMLCD monitor at your local computer store, it is a thin-film transistor active-matrix liquid crystal display. Basically, it is a high-quality flat screen monitor.
-
RE: Marzipan
a pastry of sorts, made of almonds, sugar, flour, and sometimes topped with cocoa powder. Doubles up as a sponge, kinda chewy, and leaves a bad taste in your mouth.
A hippie girl, girlfriend of Homestarrunner, who plays a guitar but plays it wrong, eats tofu and nothing except, and looks like some sorta baseball bat smashed through the top end of a huge purple bell. -
RE: Marzipan
Homestars fiercely indepent and slightly overbearing girlfriend. She qualifies as pretty in Homestars country., and she likes animals, especially cats and dogs, but it makes her sad when cats and dogs are in the same room together. She has a guitar called Carol, which she plays without her hands, since she has none. She resembles a bell or a mop.
-
RE: Pretest
Before releasing products for sale, companies often pretest their products for safety and reliability. This process typically involves detecting and fixing errors and making improvements if necessary. In the computer industry, pretesting can be performed on both hardware and software.
Computer hardware manufacturers often pretest their products rigorously before distributing them to the public. For example, a hard drive may be tested in extremely hot and cold temperatures to determine what the safe operating temperature of the hard drive is. A chip manufacturer may test a CPU under a maximum processing load for an extended period of time to make sure it does not overheat. Hard drives, CPUs, and RAM are all tested for reliability, since small errors can cause major problems. Modern computers can perform billions of calculations per second, so even one miscalculation per billion is considered highly unreliable.
Software is also pretested before it is made available for sale. The amount of pretesting is generally determined by the size and complexity of the program. Initially, pretesting is done by the software development team, as the initial bugs are worked out. Then the software may go through an alpha phase, where the developers and possibly other users test the software. As the program nears completion, it may go through a beta phase, where additional users can test the software and provide feedback to the developers. This software is called beta software and may be distributed to a select group of users or the general public. Once the beta stage is complete, the software is ready for sale. -
Permalink
Short for permanent link. A permalink is a URL that links to a specific news story or Web posting. Permalinks are most commonly used for blogs, which are frequently changed and updated. They give a specific Web address to each posting, allowing blog entries to be bookmarked by visitors or linked to from other websites.
Because most blogs are published using dynamic, database-driven Web sites, they do not automatically have Web addresses associated with them. For example, a blog entry may exist on a users home page, but the entry may not have its own Web page, ending in .html, .asp, .php, etc. Therefore, once the posting is outdated and no longer present on the home page, there may be no way to access it. Using a permalink to define the location of each posting prevents blog entries from fading off into oblivion. -
Open Firmware
Open Firmware is a type of firmware that some computer systems use when they boot up. It controls the processor and performs system diagnostics before the operating system is loaded. Open Firmware also builds the device tree, which locates internal and external devices connected to the computer. Each device is then assigned a unique address so it can be used once the computer starts up.
Several types of computers use Open Firmware, including PowerPC-based Macintosh systems, Sun Microsystems SPARC-based workstations, and IBM POWER systems. (Most Windows-based PCs use the BIOS for the same purpose.) Because Open Firmware is an open standard, devices that support Open Firmware can be typically be used in multiple Open Firmware-based systems. For example, identical PCI cards could be used in both Sun and Macintosh-based computer systems.
To access the Open Firmware interface on a PowerPC-based Macintosh, press and hold Command-Option-O-F during startup. On Sun systems, the Open Firmware interface is displayed at startup and can be accessed afterwards by pressing L1-A (or Stop-A) while the computer is running. -
RE: Inane
idiots. the correct meaning of the word inane is, putting it short for dumbasses, pointless.
-
RE: Niggered
Used when consuming excessive amounts of mind altering drugs, alcohol, or marijuana. It is used when fucked up and wasted are no longer fitting adjectives/adverbs.
-
Microcomputer
A microcomputer is a computer designed for individual use. The term was introduced in the 1970s to differentiate desktop computer systems from larger minicomputers. It is often used synonymously with the term desktop computer, but it may refer to a server or laptop as well.
In the 1960s and 1970s, computers were much larger than today, often taking up several cubic feet of space. Some mainframe computers could even fill a large room. Therefore, the first computers that could fit on a desktop were appropriately labeled microcomputers in comparison to these larger machines.
The first microcomputers became available in the 1970s and were used primarily by businesses. As they became cheaper, individuals were able to buy their own microcomputer systems. This lead to the personal computer revolution of the 1980s, in which microcomputers became a mainstream consumer product.
As microcomputers grew in popularity, the name microcomputer faded and was replaced with other more specific terms. For example, computers purchased for business purposes were labeled as workstations, while computers bought for home use became known as personal computers, or PCs. Eventually, computer manufacturers developed portable computers, which were called laptops. While computers have evolved a lot over the past few decades, these same terms are still used today. -
LAMP
Stands for Linux, Apache, MySQL, and PHP. Together, these software technologies can be used to create a fully-functional web server.
Linux is the most popular operating system used in web servers, primarily because many free Linux distributions are available. This means Linux-based servers are typically cheaper to set up and maintain than Windows servers. Since Linux is (open source|open source), it also works with many other popular open source web hosting software components.
The most important software component in the AMP package is Apache, or Apache HTTP Server. Apache is the software that serves webpages over the Internet via the HTTP protocol. Once Apache is installed, a standard Linux machine is transformed into a web server that can host live websites.
Other components of LAMP include MySQL and PHP. MySQL is a popular open source database management system (DBMS) and PHP is a popular web scripting language. Together, these two technologies are used to create dynamic websites. Instead of only serving static HTML pages, a LAMP server can generate dynamic webpages that run PHP code and load data from a MySQL database.
NOTE: In some instances, the P in LAMP may stand for either Perl or Python, which are other scripting languages. AMP packages for Windows and Mac systems are called WAMP and MAMP respectively. -
RE: Backpacker
Originally a coined slang term from the 1980s for a graffiti artist that always kept a backpack on containing his finite music collection and more importantly his rattle cans, markers, and spray tips.
Although, mainly his music collection is what defines him/her as a backpacker. Most likely the music collection will consist of usually local underground rap/hip-hop music artists only. The sub-genre or sub-categoration of the music means nothing, as long as they are a local unsigned (no recording contract) artist.
A backpackers music selections are based upon three principals: 1) no mainstream, 2) you could never buy the music in a store, and 3) the music was given/sold to them hand-to-hand from the originating recording artist.Modernly used derogatory term to describe someone who listens ONLY to Independent rap/hip-hop music, specifically (but not limited to) the nerd-rap sub-genre of the rap/hip-hop music. Most often used in reference to (but not limited by) white sub-urbanite rap/hip-hop music listeners that tend to dislike mainstream rap/hip-hop music, specifically (but not limited to) Gangsta rap.
Notes: Many Hip-Hop listeners from the 80s to early 90s agree that since the invention of the Internet, Underground has died along with Backpackers and there three main principals, hence this modernized definition incorporating Independent rap/hip-hop music and locality of artists lost. Hip-Hop listeners with twenty or more years of experience will often disagree on the definition of Backpacker with the new era of listeners who never have experienced hip-hop without the Internet.
-
Keywords
Keywords are words or phrases that describe content. They can be used as metadata to describe images, text documents, database records, and Web pages. A user may tag pictures or text files with keywords that are relevant to their content. Later on, these files may be searched using keywords, which can make finding files much easier. For example, a photographer may use a program like Extensis Portfolio or Apple iPhoto to tag his nature photos with words such as nature, trees, flowers, landscape, etc. By tagging the photos, he can later locate all the pictures of flowers by simply searching for the flowers keyword.
Keywords are used on the Web in two different ways: 1) as search terms for search engines, and 2) words that identify the content of the website.Search Engine Search Terms Whenever you search for something using a search engine, you type keywords that tell the search engine what to search for. For example, if you are searching for used cars, you may enter used cars as your keywords. The search engine will then return Web pages with content relevant to your search terms. The more specific keywords you use, the more specific (and useful) the results will be. Therefore, if you are searching for a specific used car, you may enter something like black Honda Accord used car to get more accurate results.
Many search engines also support boolean operators that can be used along with keywords to further refine the search. For example, you may search for Apple AND computers NOT fruit if you only want results related to Apple products and not the kind of apples that grow on trees.
Web Page Description Terms Keywords can also describe the content of a Web page using the keyword meta tag. This tag is placed in the
-
Infotainment
Infotainment is a combo word, like fantabulous, that combines two words into one. It refers to television shows, movies, websites, and software that blend information and entertainment together. For example, shows on the Food Network and Animal Planet provide information to the viewer, but are also fun to watch. Certain news broadcasts can also be considered infotainment, since they strive to be as entertaining as they are informational.
Websites like Yahoo.com and CNET.com also have content that is both informational and entertaining. Software titles such as Grolier Encyclopedia and Encyclopedia Britannica serve primarily to inform, but are also geared to be entertaining, so they can be considered infotainment. While there is a blurry line between basic information and infotainment, if informational media makes an intentional effort to entertain, you can call it infotainment. -
null
Impressions track how many times a webpage or element on a webpage is viewed. It is one of the standard metrics used in website analytics software. The term impressions most often refers to page impressions, which is synonymous with page views. Each time a page is viewed, a page impression is counted. Therefore, a single visitor can rack up multiple impressions on a website by visiting multiple pages.
Unique impressions, or page views by different visitors, are useful for measuring the number of daily unique visitors to a website. Website analytics software may record unique impressions by either saving a 24 hour cookie on visitors browsers or by resetting the record of unique visitors at the start of each day. Most analytics software records both total and unique impressions. These two metrics can be used to determine the average number of pages visitors view before leaving the website.
While impressions typically refer to page views, they may also define how many times individual elements on a webpage are viewed. For example, in online advertising, ad impressions track the number of times individual advertisements are displayed. If a webpage contains three ad units, each page view will produce three ad impressions. By tracking the number of ad impressions, webmasters can monitor the performance of individual ads. This information can be used in combination with RPM, or revenue per 1,000 page views, to determine the ideal amount of ads for each webpage. -
HTML5
HTML5 is the fifth major standard of HTML. Development of the standard began in 2007 and HTML5 websites started becoming mainstream in 2010. The final HTML5 standard was officially standardized by W3C on October 28, 2014.
The previous HTML standard, HTML 4.01, was standardized in 1999 – fifteen years before the HTML5 standard was published. However, in the decade preceding HTML5, most websites were written in XHTML, a more strict version of HTML published in 2000. HTML5 was designed to supersede both HTML 4 and XHTML by providing web developers with a simpler standard that includes several new features for the modern web.
The table below includes a list of new elements, or tags, introduced in HTML5 that are used to define the structure of a document.
These tags simplify the webpages source as well as the corresponding CSS styles. For example, in order to define a navigation element in XHTML, you would typically write <div class=nav> in the pages HTML and define a class called .nav in CSS. In HTML5, you can simply insert the <nav> tag in the HTML and style the element itself using CSS.
HTML5 includes several other new tags as well. Examples include <canvas> and <svg> for graphics and <audio> and <video> for multimedia elements. These tags provide new capabilities for web developers, though it is important to note that HTML5 still relies heavily on CSS and JavaScript for page styling, animations, and user interaction. Therefore, most interactive HTML5 websites are built using a combination of HTML5, CSS3, and JavaScript or jQuery.
NOTE: Previous HTML standards included a space between the HTML and the number (i.e., HTML 1.0, HTML 4.01). HTML 5.0 does away with the space and is officially written as HTML5.