[amazé] means amazing good.. if something is [amazé] it is incredible..

Posts made by Julene
-
RE: Heater
means gun. usually a 9mm or anyother pistol. mad popular by book native son
-
RE: Penthouse
The larger, more spacious handicapped stall in public restrooms. It sees the most traffic, and therefore is more prone to horrible messes.
-
RE: Bandwidth
In electronics and signalling terms it is the difference between the highest frequency component in a signal and the lowest frequency component. So called because it is the same as the width when viewed in the frequency domain or as a fourier transform.
In computing it is the throughput (transmission rate) in bits per second of a connection.
-
Speaks
Abreviation or slang for speakers, Or anything that sound electronically comes out of for that matter.
-
Webmaster
The webmaster is the person in charge of maintaining a Web site. The jobs of a webmaster include writing HTML for Web pages, organizing the Web sites structure, responding to e-mails about the Web site, and keeping the site up-to-date. On some Web sites you might see a phrase that says, send dead links and other Web site problems to [email protected]. At times, being a webmaster can be a rather arduous job. I received some dead links in the mail one time, and let me tell you, it wasnt pretty.
-
Webhook
A webhook is an event notification transmitted via HTTP, the same protocol used for transferring webpage data. It is typically sent as a POST request, which contains data that is posted to a specific URL. The URL defines the location of a script, which processes the data in the POST request.
Webhooks can be built into any application, including web apps, mobile apps, and desktop software apps. Specific events can be programmed to generates webhooks, or HTTP callbacks, which are event notifications sent over HTTP. The data may be formatted in whatever way the developer chooses, though JSON and XML formatting are commonly used.
The POST data, which is sent to a specific URL, is parsed by the corresponding script on a web server. The script may be written in one of many different server-side scripting languages, such as PHP, JSP, or C#. It may perform one or more actions, such as saving the data in a database, emailing the information to a specific address, or sending new data back to the source.
Webhooks are used for a wide variety of purposes. Examples include notifying businesses of sales, activating and deactivating software programs, updating customer information, and informing developers of software crashes. Some websites even provide APIs that allow users to send data to a URL when specific events happen. GitHub, for example, provides a list of events that can trigger a webhook, which developers can use to track changes to projects stored in their online repository.
While webhooks are an effective tool, they require an Internet connection between the data source and the web server to function. Additionally, a script must be present on the server at the destination URL and it must be able to recognize and parse the POST data. If the Internet connection or script is not available, the webhook will not work. -
Transistor
A transistor is a basic electrical component that alters the flow of electrical current. Transistors are the building blocks of integrated circuits, such as computer processors, or CPUs. Modern CPUs contain millions of individual transistors that are microscopic in size.
Most transistors include three connection points, or terminals, which can connect to other transistors or electrical components. By modifying the current between the first and second terminals, the current between the second and third terminals is changed. This allows a transistor to act as a switch, which can turn a signal on or off. Since computers operate in binary, and a transistors on or off state can represent a 1 or 0, transistors are suitable for performing mathematical calculations. A series of transistors may also be used as a logic gate when performing logical operations.
Transistors in computer processors often turn signals on or off. However, transistors can also change the amount of current being sent. For example, an audio amplifier may contain a series of transistors that are used to increase the signal flow. The increased signal generates an amplified sound output. Because of their low cost and high reliability, transistors have mostly replaced vacuum tubes for sound amplification purposes.
While early transistors were large enough to hold in your hand, modern transistors are so small they cannot be seen with the naked eye. In fact, CPU transistors, such as those used in Intels Ivy Bridge processor, are separated by a distance of 22 nanometers. Considering one nanometer is one millionth of a millimeter, that is pretty small. This microscopic size allows chip manufacturers to fit hundreds of millions of transistors into a single processor. -
Scroll Bar
When the contents of a window are too large to be displayed entirely within the window, a scroll bar will appear. For example, if a Web page is too long to fit within a window, a scroll bar will show up on the right-hand side of the window, allowing you to scroll up and down the page. If the page is too wide for the window, another scroll bar will appear at the bottom of the window, allowing you to scroll to the left and right. If the windows contents fit within the current window size, the scroll bars will not appear.
The scroll bar contains a slider that the user can click and drag to scroll through the window. As you may have noticed, the size of the slider may change for different windows. This is because the sliders size represents what percentage of the windows content is currently being displayed within the window. For example, a slider that takes up 75% of the scroll bar means 75% of the content fits within the current window size. A slider that fills only 10% of the scroll bar means only 10% of the windows contents are being displayed within the current window size. Therefore, if two windows are the same size, the one with the smaller slider has more content than the one with the larger slider.
Most scroll bars also contain up and down or left and right arrows that allow the user to scroll in small increments by clicking the arrows. However, clicking and dragging the slider is much faster, so the arrow keys are typically not used as often. Also, some mice have a scroll wheel that allows the user to scroll by dragging the wheel instead of clicking and dragging within the scroll bar. -
Scalable
Scalable Hardware or software can expand to support increasing workloads. This capability allows computer equipment and software programs to grow over time, rather than needing to be replaced.
Scalable Hardware may refer to a single computer system, a large network of computers, or other computer equipment. The scalability of a single computer, such as a workstation, depends on how expandable the computer is. In this context, the words scalable, expandable, and upgradable may be used interchangeably. For example, a computer that has multiple drive bays has scalable disk space, since more internal storage devices may be added. A computer that includes multiple PCI slots has scalable graphics and I/O capabilities since PCI cards may be added or upgraded. A scalable network should be able to support additional connections without data transfers slowing down. In each instance, scalable Hardware can expand to meet increasing demands.
Scalable software typically refers to business applications that can adapt to support an increasing amount of data or a growing number of users. For example, a scalable database management system (DBMS) should be able to efficiently expand as more data is added to the database. Scalable Web hosting software should make it easy to add new users and new Web hosting accounts. They key is that the software grows along with the increased usage. This means scalable programs take up limited space and resources for smaller uses, but can grow efficiently as more demands are placed on the software.
The scalability of Hardware and software is important to growing businesses. After all, it is typically more economical to upgrade current systems than replace them with new ones. While all Hardware and software have some limitations, scalable equipment and programs offer a long-term advantage over those that are not designed to grow over time. -
PRAM
Stands for Parameter Random Access Memory, and is pronounced P-ram. PRAM is a type of memory found in Macintosh computers that stores system settings. These settings include display settings (like screen resolution and color depth), the time zone setting, speaker volume, and the startup volume choice. The system settings that are stored in the computers PRAM differ from Mac to Mac, but the purpose of the memory remains the same.
If your Macintosh is behaving erratically or is not booting up all the way, you may want to try resetting the PRAM. You can reset or zap the PRAM on a Mac by pressing and holding the Command, Option, P, and R keys right as you turn the computer on. Yes, there are four keys you need to hold down at the same time. Once your hear the startup chime a second time, the PRAM has been reset and you can release the keys.
Note that if you choose to zap your PRAM, you may need to set your display, time zone, startup volume, and other affected settings using System Preferences. Some firmware updates may reset your PRAM as part of their installation process, which will means you will have to reset the affected settings after the installation. -
Payload
When data is sent over the Internet, each unit transmitted includes both header information and the actual data being sent. The header identifies the source and destination of the packet, while the actual data is referred to as the payload. Because header information, or overhead data, is only used in the transmission process, it is stripped from the packet when it reaches its destination. Therefore, the payload is the only data received by the destination system.
-
OS X
OS X is Apples operating system that runs on Macintosh computers. It was first released in 2001 and over the next few years replaced Mac OS 9 (also known as Mac OS Classic) as the standard OS for Macs. It was called Mac OS X until version OS X 10.8, when Apple dropped Mac from the name.
OS X was originally built from NeXTSTEP, an operating system designed by NeXT, which Apple acquired when Steve Jobs returned to Apple in 1997. Like NeXTSTEP, OS X is based on Unix and uses the same Mach kernel. This kernel provides OS X with better multithreading capabilities and improved memory management compared to Mac OS Classic. While the change forced Mac developers to rewrite their software programs, it provided necessary performance improvements and scalability for future generations of Macs.
The OS X desktop interface is called the Finder and includes several standard features. OS X does not have a task bar like Windows, but instead includes a menu bar, which is fixed at the top of the screen. The menu bar options change depending on what application is currently running and is only hidden when full screen mode is enabled. The Finder also includes a Dock, which is displayed by default on the bottom of the screen. The Dock provides easy one-click access to frequently used applications and files. The Finder also displays a user-selectable desktop background that serves as a backdrop for icons and open windows.
When you start up a Mac, OS X loads automatically. It serves as the fundamental user interface, but also works behind the scenes, managing processes and applications. For example, when you double-click an application icon, OS X launches the corresponding program and provides memory to the application while it is running. It reallocates memory as necessary and frees up used memory when an application is quit. OS X also includes an extensive API, or library of functions, that developers can use when writing Mac programs.
While the OS X interface remains similar to the original version released in 2001, it has gone through several updates, which have each added numerous new features to the operating system. Below is a list of the different versions of OS X, along with their code names. -
OCR
Stands for Optical Character Recognition. This technology is what allows you to scan that paper you lost on your hard drive, but fortunately printed out, back into your computer. When a page of text is scanned into a computer without OCR software, all the computer sees is a bunch graphical bits, or an image. In other words, it has no idea that there is text on the page, much less what the text says. However, an OCR program can convert the characters on the page into a text document that can be read by a word processing program. More advanced OCR programs can even keep the formatting of the document in the conversion.
-
Newline
Newline is a character that marks the end of a line of text. As the name implies, it is used to create a new line in a text document, database field, or any other block of text.
When typing in a word processor, you can enter a newline character by pressing the Enter or Return key on your keyboard. This creates a line break (also known as a carriage return or line feed) in the text and moves the cursor to the beginning of the next line. When a line break occurs at the end of a block of text, it is called a trailing newline.
The newline character is important in computer programming, since it allows programmers to search for line breaks in text files. For example, if a data file lists one element per line, the items can be delimited by newline characters. In most modern programming languages, the newline character is represented by either \n or \r. Some databases, like MySQL, store line breaks using a combination of \r\n. By searching for newline characters in text strings, programmers can parse documents line by line and remove unwanted line breaks. -
Media Compression
Like file compression, the goal of media compression is to reduce file size and save disk space. However, media compression algorithms are specific to certain types of media, such as image, audio, and video files.
Most popular image formats use some type of compression. Three of the most common include JPEG, GIF, and PNG. JPEG compression, which is commonly used for digital photos, incorporates a lossy compression algorithm that averages nearby colors and removes color variations that are imperceivable by the human eye. GIF compression reduces the color palette of an image to 256 colors or less, which provides an efficient way to represent each color within the image. PNG compression uses a lossless compression algorithm that filters the image data and predicts pixel colors based on other nearby pixels. While each of these algorithms work in different ways, they can all be used to significantly reduce the file size of an uncompressed image.
Several common audio file formats also use compression to save disk space. Popular audio formats, such as MP3 and M4A use compression algorithms that remove inaudible frequencies and reduce the dynamics of the sound. Since uncompressed audio files, such as AIFF and WAVE files, take up a lot of disk space, they are often compressed as MP3 or M4A files before they are distributed over the Internet. These files are typically around one tenth the size of the original audio files and have nearly identical sound quality.
Most video files are also compressed. Popular video formats, such as MPEG and DivX compress video using a specific codec. Each codec uses a custom algorithm that removes redundant information from the video. For example, if the background of a video doesnt change for awhile, a codec can reduce the file size by not redrawing the background every frame. A video codec may also incorporate audio compression to reduce the size of the audio track. Since encoded videos are decoded as they are played, the codec that was used to encode a video must also be available to decode the video. Therefore, in order to play a compressed video file on your computer, your video player software must have the appropriate codec installed.
Related file extensions: .JPG, .GIF, .PNG, .MP3, .M4A, .MPG, .DIVX. -
HTTPS
Stands for HyperText Transport Protocol Secure. HTTPS is the same thing as HTTP, but uses a secure socket layer (SSL) for security purposes. Some examples of sites that use HTTPS include banking and investment websites, e-commerce websites, and most websites that require you to log in.
Websites that use the standard HTTP protocol transmit and receive data in an unsecured manner. This means it is possible for someone to eavesdrop on the data being transferred between the user and the Web server. While this is highly unlikely, it is not a comforting thought that someone might be capturing your credit card number or other personal information that you enter on a website. Therefore, secure websites use the HTTPS protocol to encrypt the data being sent back and forth with SSL encryption. If someone were to capture the data being transferred via HTTPS, it would be unrecognizable.
You can tell if a website is secure by viewing the URL in the address field of your Web browser. If the Web address starts with https://, you know you are accessing a secure website. Most browsers will also display a lock icon somewhere along the edge of the window to indicate the website you are currently visiting is secure. You can click the lock icon to view the secure certificate that authenticates the website.
So whenever you are asked to enter personal or financial information on a website, make sure that the URL starts with https:// and that the lock icon appears in the window. Then you can be sure that the website is secure and any data you enter will only be recognized by your computer and the Web server. -
Halftone
A halftone, or halftone image, is an image comprised of discrete dots rather than continuous tones. When viewed from a distance, the dots blur together, creating the illusion of continuous lines and shapes. By halftoning an image (converting it from a bitmap to a halftone), it can be printed using less ink. Therefore, many newspapers and magazines use halftoning to print pages more efficiently.
Originally, halftoning was performed mechanically by printers that printed images through a screen with a grid of holes. During the printing process, ink passed through the holes in the screen, creating dots on the paper. For monochrome images, only one pass was needed to create an image. For multicolor images, several passes or screens were required.
Todays printers are more advanced and typically do not contain physical screens. Instead, the halftone images are generated by a computer and the resulting image is printed onto the paper. By using a process called dithering, modern printers can randomize the dot patterns, creating a more natural appearance. This produces realistic images using far less ink than fully saturated ones.
Like a standard bitmap, the quality of a halftone image depends largely on the its resolution. A halftone with a high resolution (measured in LPI), will have greater detail than a halftone with a low resolution. While the goal of halftoning is typically to create a realistic image, sometimes low resolutions are used for an artistic effect.