the act of getting something stolen or taken away from you.

Posts made by Cami
-
Microblogging
Microblogging is posting brief and often frequent updates online. Unlike traditional blogs, which are often hosted on a custom website, microblogs are typically published on social media sites like Twitter or Facebook.
The most common microblogging platform is Twitter, which allows allows you to post updates of 140 characters or less. These updates, called tweets, may include hashtags, mentions (links to other Twitter users), or links to online resources, such as webpages, images, or videos. When you microblog using Twitter, your updates are seen by all users who have chosen to follow you.
Microblogging on Facebook is more flexible than on Twitter, since you can post longer updates and include media directly in your posts. You can also share content with other users, similar to Twitters retweet feature. Though Facebook makes it easy to post quick updates, its focus is more towards social networking than microblogging. Therefore, Twitter remains the most popular microblogging platform.
While Facebook and Twitter dominate the microblogging scene, there are several other options available. One popular service is Tumblr, a website (owned by Yahoo!) that was designed specifically for microblogging. Tumblr allows you to easily insert photos, videos, quotes, and links into your posts and includes a reblog feature for sharing other users posts. Another service is Google , which is similar to Facebook, and allows you to post updates that can be seen by the public or specific user within Google circles. Instagram (owned by Facebook) is a microblogging platform designed for sharing images, while Vine allows you to share short videos. -
Lossy
Lossy file compression results in lost data and quality from the original version. Lossy compression is typically associated with image files, such as JPEGs, but can also be used for audio files, like MP3s or AAC files. The lossyness of an image file may show up as jagged edges or pixelated areas. In audio files, the lossyness may produce a watery sound or reduce the dynamic range of the audio.
Because lossy compression removes data from the original file, the resulting file often takes up much less disk space than the original. For example, a JPEG image may reduce an images file size by more than 80%, with little noticeable effect. Similarly, a compressed MP3 file may be one tenth the size of the original audio file and may sound almost identical.
The keyword here is almost. JPEG and MP3 compression both remove data from the original file, which may be noticeable upon close examination. Both of these compression algorithms allow for various quality settings, which determine how compressed the file will be. The quality setting involves a trade-off between quality and file size. A file that uses greater compression will take up less space, but may not look or sound as good as a less compressed file. Some image and audio formats allow lossless compression, which does not reduce the files quality at all. -
Laser Printer
A laser printer is a printer that uses a focused beam or light to transfer text and images onto paper. Though contrary to popular belief, the laser does not actually burn the images onto the paper. Instead, as paper passes through the printer, the laser beam fires at the surface of a cylindrical drum called a photoreceptor. This drum has an electrical charge (typically positive), that is reversed in areas where the laser beam hits it. By reversing the charge in certain areas of the drum, the laser beam can print patterns (such as text and pictures) onto the photoreceptor.
Once the pattern has been created on the drum, it is coated with toner from a toner cartridge. The toner is black in most cartridges, but may be cyan, magenta, and yellow in color laser printers. The positively charged toner clings to areas of the drum that have been negatively charged by the laser. When the paper passes through the printer, the drum is given a strong negative charge, which allows the toner to transfer and stick to the paper. The result is a clean copy of the image written on the paper.
Because laser printers do not use ink, they have less image smearing problems than inkjet printers and are able to print pages faster. While laser printers and toner cartridges typically cost more than inkjet printers and ink cartridges, most laser toner cartridges last several times longer than ink cartridges, which makes their cost per page about equal. For this reason, businesses tend to use laser printers, while consumers are more likely to use inkjet printers. Laser printers typically have a resolution of 600 dpi (dots per inch) or higher. -
Horizontal Market Software
A horizontal market is one that supplies goods to a variety of industries instead of just one. Therefore, horizontal market software is software that can be used by several different types of industries.
For example, word processing and spreadsheet programs are horizontal market applications because they can be used by many types of businesses and consumers. A business owner might use word processing software to type memos to his employees, while a student might use the same program to write a paper for a class.
Software developers that create programs for horizontal markets typically have a broad audience, but also face high levels of competition. The opposite of horizontal market software is vertical market software, which is only developed for a specific industry. -
RE: Hashtag
A hashtag is a number symbol (#) used to label keywords in a tweet. The name hashtag was coined by Twitter and combines the word hash (another name for the number symbol) and tag, since it is used to tag certain words. In order to tag a keyword in a Twitter post, simply type a number symbol (Shift 3) immediately before the word. For example, you can tag the word tech in a tweet by typing #tech.
Twitter automatically turns hashtagged words into links to a dynamic feed. This feed is updated in real-time and lists all recent tweets containing the same hashtag. When you post a tweet with a hashtag, your tweet will show up in the public feed. Besides clicking on hashtags within tweets, you can also search for hashtags using Twitters search feature.
Hashtags are used to categorize tweets, since all tweets with the same hashtag are related. Therefore, searching for hashtags is a good way to monitor hot topics or trends. For example, #marchmadness is popular during the March NCAA tournament, while #election might be popular during political elections. Company names, such as #apple and #microsoft, are common hashtagged terms and may be used when people comment on new product releases. As people post tweets with the same hashtag, the corresponding feed can easily turn into a discussion.
A hashtag can be any word or combination or words and can also include numbers. You can use trending hashtags in your tweets or make up your own. However, it is best to use popular hashtags if you want others to see your tweet. Each Twitter post can include multiple hashtags, though Twitter discourages spamming tweets with hashtags and recommends using no more than three hashtags per tweet. It is common to include hashtags at the end of a tweet, but you can hashtag any word by simply adding a number symbol in front of it. -
RE: Champer
In reference to the male gentitalia.
Used in small groups as an affectionate name for friends.
Rabs favourite word
-
Flash Memory
Flash memory is a type of electrically erasable programmable read-only memory (EEPROM). Whew, thats a mouthful. The name comes from how the memory is designed -- a section of memory cells can be erased in a single action or in a flash. A common use of flash memory is to store the BIOS settings in a computers ROM. When the BIOS needs to be changed, the flash memory can be written in blocks, rather than bytes, making it easy to update. Most modems use flash memory for the same reason.
Though flash memory was orginally used inside computers, it has invaded many other areas outside the box. Flash memory cards used for digital cameras, cellular phones, networking hardware, and PC cards. Though the memorys read/write speed is not lightning fast, it is nice to be able to tote around a little card rather than a cumbersome hard drive. -
Firewall
A physical firewall is a wall made of brick, steel, or other inflammable material that prevents the spread of a fire in a building. In computing, a firewall serves a similar purpose. It acts as a barrier between a trusted system or network and outside connections, such as the Internet. However, a computer firewall is more of a filter than a wall, allowing trusted data to flow through it.
A firewall can be created using either hardware or software. Many businesses and organizations protect their internal networks using hardware firewalls. A single or double firewall may be used to create a demilitarized zone (DMZ), which prevents untrusted data from ever reaching the LAN. Software firewalls are more common for individual users and can be custom configured via a software interface. Both Windows and OS X include built-in firewalls, but more advanced firewall utilities can be installed with Internet security software.
Firewalls can be configured in several different ways. For example, a basic firewall may allow traffic from all IP addresses except those flagged in a blacklist. A more secure firewall might only allow traffic from systems or IP addresses listed in a whitelist. Most firewalls use a combination of rules to filter traffic, such as blocking known threats while allowing incoming traffic from trusted sources. A firewall can also restrict outgoing traffic to prevent spam or hacking attempts.
Network administrators often custom configure hardware and software firewalls. While custom settings may be important for a company network, software firewalls designed for consumers typically include basic default settings that are sufficient for most users. For example, in OS X, simply setting the firewall to On in the Security -
External Hard Drive
Nearly all personal computers come with an internal hard drive. This drive stores the computers operating system, programs, and other files. For most users, the internal hard drive provides enough disk space to store all the programs and files. However, if the internal hard drive becomes full or if the user wants to back up the data on the internal hard drive, and external hard drive may be useful.
External hard drives typically have one of two interfaces - USB or Firewire. USB hard drives commonly use the USB 2.0 interface because it supports data transfer rates of up to 480 Mbps. USB 1.1 only supports transfers of up to 12 Mbps, which would make the hard drive seem slow to even the most patient people. Firewire drives may use either Firewire 400 or Firewire 800, which support data transfer rates of up to 400 and 800 Mbps respectively.
The most likely users to need external hard drives are those who do audio and video editing. This is because high-quality media files can fill up even the largest hard drives. Fortunately, external hard drives can be daisy chained, which means they can be connected one after the other and be used at the same time. This allows for virtually unlimited amounts storage.
Users who do not require extra storage may still find external hard drives useful for backing up their main hard drive. External hard drives are a great backup solution because they can store an exact copy of another hard drive and can be stored in a safe location. Using the drive to restore data or perform another backup is as simple as connecting it to the computer and dragging the necessary files from one drive to another.
While most external hard drives come in heavy, protective cases, some hard drives are designed primarily for portability. These drives usually dont hold as much data as their larger desktop counterparts, but they have a sleek form factor and can easily be transported with a laptop computer. Some portable drives also include security features such as fingerprint recognition that prevent other people from accessing data on the drive in case it is lost. -
eSATA
Stands for External Serial Advanced Technology Attachment. eSATA is a variation of the SATA interface that supports external storage devices. It was standardized in 2004 and uses the same pins and same protocols as internal SATA. However, it provides a slightly different, more rugged connector. The eSATA standard also supports a cable length of two meters compared to the one meter cable length supported by SATA.
Since eSATA uses the same protocols as SATA, an eSATA drive offers the same high-speed data transfer rates as and internal SATA drive. For example, an eSATA 3.0 drive can transfer data at 6 Gbps or 4.8 Gbps, taking into account the data encoding process. This is significantly faster than Firewire 800 (800 Mbps) and USB 2.0 (480 Mbps) and is on par with USB 3.0 (5 Gbps).
Because eSATA offers such fast transfer rates, it has been a popular external hard drive interface used by video editors, audio producers, and other media professionals. While eSATA is one of the fastest interfaces available, it is surpassed by both Thunderbolt (10 Gbps) and Thunderbolt 2.0 (20 Gbps), which are alternatives to eSATA.
Unlike Firewire, USB, and Thunderbolt, the eSATA interface does not provide power to connected devices. Therefore, all drives connected via eSATA must include a separate power connector to provide electricity to the device. A variation of eSATA, called eSATAp or eSATA USB Hybrid Port (EUHP), combines four USB pins and two 12-volt power pins into the eSATA connector. An eSATAp port supports both eSATA and USB connectors. It allows connected devices to draw power from the computers power supply, eliminating the need for a separate power cable. -
E-mail Bankruptcy
In this day and age, most of us receive several e-mails a day. Depending on your job, you may even receive dozens of daily messages that are not spam. While it is hard enough to keep up with this plethora of e-mails received in a single day, if you fall behind a few days, it can be nearly impossible to catch up. After awhile, you may end up with hundreds of messages in your inbox that have not been replied to.
If your become submerged underneath an endless pile of e-mail in your inbox, the only way out may be to declare e-mail bankruptcy. Similar to a financial bankruptcy, e-mail bankruptcy involves writing off the losses and starting over. The most tactful way of declaring e-mail bankruptcy is to paste all the e-mail addresses from the messages you have not responded to into a single message. Then send a message explaining that you have fallen too far behind on your e-mail and apologize for not responding. The quicker, but less considerate option is to simply delete all the old messages and start over like nothing ever happened.
While it is best to avoid e-mail bankruptcy by keeping up with your e-mail, for some people it may be the only way to get current with their correspondence. If you are in a situation where you feel overwhelmed by the growing number of messages in your inbox, make sure you first reply to the most important messages. Then, as a last resort, declaring e-mail bankruptcy may give you the fresh start you need. -
EIDE
Stands for Enhanced Integrated Drive Electronics. EIDE is an improved version of the IDE drive interface that provides faster data transfer rates than the original standard. While the original IDE drive controllers supported transfer rates of 8.3 Mbps, EIDE can transfer data up to 16.6 Mbps, which is twice as fast.
The term EIDE can be a bit ambiguous, since it technically refers to an ATA standard known as ATA-2 or Fast ATA. Therefore, the terms EIDE, ATA-2, and Fast ATA may be used synonymously. To add to the confusion, EIDE may also refer to the ATA-3 standard, which is similar to ATA-2, but includes additional features. ATA-3 supports the same maximum data transfer rate as ATA-2, but has SMART support and uses a 44 pin connector.
While EIDE was the most common drive controller used for many years, it has since been replaced by updated versions of the ATA standard that support Ultra DMA. These include the ATA-4 through ATA-7 standards, which provide data throughput rates from 33 to 133 Mbps. Most modern computers use a completely new standard called Serial ATA, or SATA, which supports even faster transfer rates.
-
Debug
Computer programmers, like everybody else, are not perfect. This means the programs they write sometimes have small errors, called bugs, in them. These bugs can be minor, such as not recognizing user input, or more serious, such as a memory leak that crashes the program. Before releasing their software to the public, programmers debug their programs, eliminating as many errors as possible. This debugging process often takes a long time, as fixing some errors may introduce others. Debugging your windshield at a gas station is much easier than debugging a computer program.
-
Datagram
Datagram is a combination of the words data and telegram. Therefore, it is a message containing data that is sent from location to another. A datagram is similar to a packet, but does not require confirmation that it has been received. This makes datagrams ideal for streaming services, where the constant flow of data is more important than 100% accuracy.
Datagrams are also called IP datagrams since they are used by the Internet protocol (IP). This protocol defines how information is sent between systems over the Internet. For example, each device connected to the Internet must have an IP address, which serves as a unique identifier. Whenever data is transmitted via the Internet protocol, it is broken up into packets or datagrams, which each contain a header plus the actual data transmitted.
A datagram header defines the source and destination of the data as well as other information, such as the total length (or size) of the datagram, time to live (TTL), and the specific protocol used to transfer the data. Generally, datagrams are sent via the UDP protocol, which is used for media streaming and other services that do not require confirmation that the data has been received. Packets, on the other hand, are typically sent via TCP, which guarantees all the data sent has been received. -
CPC
Stands for Cost Per Click, and is used in online advertising. CPC defines how much revenue a publisher receives each time a user clicks an advertisement link on his website. For example, a publisher may place text or image-based ads on his website. When a visitor clicks one of the advertisements, he or she is directed to the advertisers website. Each click is recorded by the advertisers tracking system and the publisher is paid a certain amount based on the CPC.