When you friend a user on a social networking website, you add that person to your list of online friends. When you remove a person from your friend list, you unfriend that user.
Unfriending may be done for many reasons. For example, if an online friend is contacting you too often or writing on your wall too much, you may want to remove that user from your list of friends. You may also wish to unfriend a user if a relationship with that person has ended. When you unfriend someone, that person no longer has friend access to your profile page. This means he or she may no longer be able to view your profile or post comments on your wall. You can customize these options for friends and non-friends in Facebook using the Privacy Settings link.
Some situations may require a mass unfriending, which involves removing many people from your friend list at one time. Many MySpace and Facebook users have hundreds or even thousands of friends, though most of these people are not close friends in real life. Since users with friend status can view your personal profile data, it might make sense to unfriend users that you dont know.

Posts made by Monty
-
Unfriend
-
Typecasting
Typecasting, or type conversion, is a method of changing an entity from one data type to another. It is used in computer programming to ensure variables are correctly processed by a function.
An example of typecasting is converting an integer to a string. This might be done in order to compare two numbers, when one number is saved as a string and the other is an integer. For example, a mail program might compare the first part of a street address with an integer. If the integer 123 is compared with the string 123 the result might be false. If the integer is first converted to a string, then compared with the number in the street address, it will return true.
Another common typecast is converting a floating point number to an integer. This might be used to perform calculations more efficiently when the decimal precision is unnecessary. However, it is important to note that when typecasting a floating point number to an integer, many programming languages simply truncate the decimal value. This is demonstrated in the C function below.
int float_to_int(float a) // example: a = 2.75{ int b = (int)a; // typecast float to int return b; // returns 2}
In order to round to the nearest value, adding 0.5 to the floating point number and then typecasting it to an integer will produce an accurate result. For example, in the function below, both 2.75 and 3.25 will get rounded to 3.
int round_float_to_int(float a) // example: a = 2.75{ int b = (int)(a 0.5); // typecast float to int after adding 0.5 return b; // returns 3}
While most high-level programming languages support typecasting, each language uses its own method to convert data. Therefore, it is important to understand how the language converts between data types when typecasting variables. -
RE: Tutorial
A computer tutorial is an interactive software program created as a learning tool. Tutorials help people learn new skills by using a step-by-step process that ensures the user is following along and comprehending the material. For example, a Web development tutorial may begin with instructions on how to create a basic Web page. This page might only include the words Welcome to my website on it and use the minimum HTML required in order for the page to load in a Web browser. Once the user is able to create a working Web page, the tutorial may explain how to add other features, such as styled text, table layouts, and images, to the page. Then the tutorial may provide instructions on how to publish the Web page to the Internet.
Some software tutorials provide testing features to ensure comprehension of the material, while others may be simple walkthroughs of a software program. Tutorials can be used for both school and business purposes and are written for basic, intermediate, and advanced users. Even smart computer programmers use tutorials. Most software development programs include a tutorial for creating a Hello World! program, which is the most basic program that can be created with the software. Since tutorials offer a gradual approach to learning, they can be helpful to people at many different skill levels. If a computer programmer can benefit from a tutorial, just about anybody can. -
Source Code
Every computer program is written in a programming language, such as Java, C/C , or Perl. These programs include anywhere from a few lines to millions of lines of text, called source code.
Source code, often referred to as simply the source of a program, contains variable declarations, instructions, functions, loops, and other statements that tell the program how to function. Programmers may also add comments to their source code that explain sections of the code. These comments help other programmers gain at least some idea of what the source code does without requiring hours to decipher it. Comments can be helpful to the original programmer as well if many months or years have gone by since the code was written.
Short programs called scripts can be run directly from the source code using a scripting engine, such as a VBScript or PHP engine. Most large programs, however, require that the source code first be compiled, which translates the code into a language the computer can understand. When changes are made to the source code of these programs, they must be recomplied in order for the changes to take effect in the program.
Small programs may use only one source code file, while larger programs may reference hundreds or even thousands of files. Having multiple source files helps organize the program into different sections. Having one file that contains every variable and function can make it difficult to locate specific sections of the code. Regardless of how many source code files are used to create a program, you will most likely not see any of the original files on your computer. This is because they are all combined into one program file, or application, when they are compiled. -
Runtime Error
A runtime error is a program error that occurs while the program is running. The term is often used in contrast to other types of program errors, such as syntax errors and compile time errors.
There are many different types of runtime errors. One example is a logic error, which produces the wrong output. For example, a miscalculation in the source code or a spreadsheet program may produce the wrong result when a user enters a formula into a cell. Another type of runtime error is a memory leak. This type of error causes a program to continually use up more RAM while the program is running. A memory leak may be due to an infinite loop, not deallocating unused memory, or other reasons.
A program crash is the most noticeable type of runtime error, since the program unexpectedly quits while running. Crashes can be caused by memory leaks or other programming errors. Common examples include dividing by zero, referencing missing files, calling invalid functions, or not handling certain input correctly.
NOTE: Runtime errors are commonly called referred to as bugs, and are often found during the debugging process, before the software is released. When runtime errors are found after a program has been distributed to the public, developers often release patches, or small updates, designed fix the errors. -
QuickTime
This is a multimedia technology developed by our friends at Apple Computer. It is a popular format for creating and storing sound, graphics, and movie (.mov) files. Though it is an Apple technology, QuickTime software is available for both the Mac and the PC. If you dont have QuickTime on your computer, or if you want to see if you have the latest version, check out Apples QuickTime site.
-
RE: Squoze
Pastense of squeeze.
Appeared in poems by E.J Brady (1869-1952). First appeared in his publishd works titled The ways of many waters in 1909.
-
Optical Carrier
High-speed fiber optic connections are measured in Optical Carrier or OC transmission rates. These rates include several standardized bandwidth amounts supported by Synchronous Optical Networking (SONET) connections. They are generically referred to as OCx, where the x represents a multiplier of the basic OC-1 transmission rate, which is 51.84 Mbps.
The following is a list of standardized Optical Carrier (OC) data transmission rates. The STM numbers in parentheses are the OC equivalents defined in the Synchronous Digital Hierarchy (SDH). The STM numbers are commonly used to define the bandwidth supported by high-speed networking hardware.
As you can see from the list above, the number following OC- servers as a multiplier of the basic OC-1 rate of 51.84 Mbps. For example, OC-3 is 51.84 Mbps x 3, or 155.52 Mbps. OC-12 is 4 times that of the OC-3 rate (155.52 Mbps x 4), which is 622.08 Mbps.
OC rates are used to measure speeds of high-speed optical networks, from local business-to-business connections, to the highest bandwidth connections used for the Internet backbone. Small and medium sized businesses that require high-speed Internet connectivity may use OC-3 or OC-12 connections. ISPs that require much larger amounts of bandwidth may use one or more OC-48 connections. Generally, OC-192 and greater connections are used for the Internet backbone, which connects the largest networks in the world together. -
OpenGL
OpenGL, or the Open Graphics Library, is a 3D graphics language developed by Silicon Graphics. Before OpenGL was available, software developers had to write unique 3D graphics code for each operating system platform as well as different graphics hardware. However, with OpenGL, developers can create graphics and special effects that will appear nearly identical on any operating system and any hardware that supports OpenGL. This makes it much easier for developers of 3D games and programs to port their software to multiple platforms.
So how exactly does OpenGL work? When programmers write OpenGL code, they specify a set of commands. Each command executes a drawing action or creates a special effect. Using hundreds or even thousands of these OpenGL commands, programmers can create 3D worlds which can include special effects such as texture mapping, transparency (alpha blending), hidden surface removal, antialiasing, fog, and lighting effects. An unlimited amount of viewing and modeling transformations can be applied to the OpenGL objects, giving developers an infinite amount of possibilities. -
null
Stands for Nothing In, Nothing Out. The acronym NINO (pronounced nee-no) is a computer science term that states if nothing is entered into a program, nothing is produced. It can also be translated, No Input, No Output.
Computers operate by processing information. If there is no input (or information to process), there can be no output. Input can be entered by a human, such as typing text in a word processor or clicking on a link in a web browser. It can also be entered by software, such as a bootstrap operation or a bot that automatically executes commands.
In computer programming, NINO can explain why a function does not produce a result. If it does not receive the parameters it needs to run correctly, the function may fail or produce a NULL value. If the function receives invalid input, it may either return nothing or a garbage result. This process can be summarized as GIGO (Garbage In, Garbage Out).
A well programmed function checks all input and produces an error message if the data is either missing or invalid. This prevents NINO and GIGO errors since bad input can cause bugs or crashes within a program. -
Mobile
The word mobile has a storied history in the computer world. The term was intially used in the 1980s to describe computers that you could take with you and use while you were on-the-go. These devices eventually became small and light enough to fit on your lap and were known as laptops. For many years, mobile differentiated between desktop computers and their portable counterparts.
Then came the smartphone. Spurred by the release of the first iPhone in 2007, mobile phones evolved into small computers that could surf the web, send email, and run different apps. The IT community started using the word mobile to describe cell phones as well as computers.
Next came tablets. These lightweight touchscreen devices, which are even more portable than laptops, introduced a new mobile category between laptops and smartphones. Mobile evolved into an umbrella term that now describes laptops, tablets, and smartphones.
When used in different contexts, such as mobile development, designing for mobile, and mobile-friendly, the term mobile can have different meanings. For example, mobile development typically refers to creating touch-based apps for tablets and smartphones, but not laptops. Designing for mobile might refer to responsive web design that supports mobile devices with smaller screens, such as tablets and smartphones.
Mobile-friendly refers to websites that are easy to use on smartphones. In this case, mobile is used synonymously with smartphone, but not necessarily tablet. This smartphone-specific definition of mobile has become common in web analytics. For example, Google Analytics separates traffic by device into Desktop, Tablet, and Mobile categories. Desktop refers to both desktop and laptop computers, while Mobile refers specifically to smartphones. -
Mirrored Volume
A mirrored volume is a hard drive or other form of storage media that stores an exact copy of the data from another volume. It is used for fault tolerance, which means mirrored volume serves as a backup device in case the primary device fails.
Companies and organizations that store critical information typically mirror the data on another drive. Using a mirrored volume decreases the chance of losing data exponentially. For example, if the odds of a hard drive going bad is 1 out of 200, the odds of two drives going bad at the same time is 1 out of 40,000.
Mirroring data can be done using various backup software programs or may be enabled within operating systems that support disk mirroring. While using a mirrored volume helps keep data safe, it also slows down data transfers because the data must always be written twice. It also costs more, since mirroring data requires twice as much disk storage than what would otherwise be required. However, the cost of an extra hard drive is usually well worth the security of having important data backed up.
Mirroring may also be referred to as duplexing or RAID 1. -
Mashup
The term mashup has several meanings. It was originally used to describe songs that meshed two different styles of music into one song. For example, a classic rock song put to a well-known hip-hop beat may be considered a mashup. It is also used to describe videos that have been compiled using different clips from multiple sources. For example, a skateboarding movie created from several different skateboard videos found would be considered a video mashup.
A mashup also describes a Web application that combines multiple services into a single application. For example, a Web forum may contain a mashup that uses Google Maps to display what parts of the world the users are posting from. Yahoo offers a mashup called Yahoo! Pipes that aggregates RSS feeds into a single page that can be navigated using a graphical interface.
The primary purpose of most Web mashups is to consolidate information with an easy-to-use interface. Because the combinations of Web applications are limitless, so are the possibilities of mashups. Therefore, as mashups continue to evolve, dont be surprised to see them popping up on your favorite websites. After all, we can always use new tools that help make information easier to find! -
LinkedIn
LinkedIn is a social networking website designed for business professionals. It allows you to share work-related information with other users and keep an online list of professional contacts.
Like Facebook and MySpace, LinkedIn allows you to create a custom profile. However, profiles created within LinkedIn are business-oriented rather than personal. For example, a LinkedIn profile highlights education and past work experience, which makes it appear similar to a resume. Profiles also list the your connections to other LinkedIn users, as well as recommendations you make or receive from other users.
By using LinkedIn, you can keep in touch with past and current colleagues, which can be useful in todays ever-changing work environment. You can also connect with new people when looking for potential business partners. While people outside your personal network cannot view your full profile, they can still view a snapshot of your education and work experience. They can also contact you using LinkedIns anonymous InMail messaging service, which could lead to new job opportunities.
LinkedIn has several benefits for business professionals, which is why it is used by millions of people across the world. Just remember, if you decide to create a LinkedIn profile, keep your information professional. Its best to save your personal information for the other social networking websites. -
RE: Bucked
-
Adj.- metaphorical juxtaposion of the effect of being bucked (standard def.) by a donkey, as it pertains to an existential circumstance
-
V.- to cause physical or mental impairment; to harm
-
Adv.- in a recieving or delivering state of [buckage].
-
-
KOffice
KOffice (pronounced K-office) is an integrated office suite for the K Desktop Environment (KDE), a desktop interface for Unix systems. KOffice is the most notable of all KDE applications, since it singlehandedly provides most of the basic productivity features needed by KDE users. Like KDE, both the KOffice source code and the office suite itself are available as free downloads.
KOffice includes several different applications, including productivity, creativity, management, and supporting programs. The applications included with KOffice are listed below.
Productivity
Creativity
Management
Supporting Programs
More information about KOffice is available at the KOffice Homepage. -
Kilobyte
A kilobyte is 103 or 1,000 bytes.
The kilobyte (abbreviated K or KB) is the smallest unit of measurement greater than a byte. It precedes the megabyte, which contains 1,000,000 bytes. While one kilobyte is technically 1,000 bytes, kilobytes are often used synonymously with kibibytes, which contain 1,024 bytes.
Kilobytes are most often used to measure the size of small files. For example, a plain text document may contain 10 KB of data and therefore would have a file size of 10 kilobytes. Small website graphics are often between 5 KB and 100 KB in size. While some files contain less than 4 KB of data, modern file systems such as NTFS (Windows) and HFS (Mac) have a cluster size of 4 KB. Therefore, individual files typically take up a minimum of four kilobytes of disk space.
NOTE: View a list of all the units of measurement used for measuring data storage. -
Internet of Things
The Internet of Things, commonly abbreviated IoT, is an umbrella term that refers to anything connected to the Internet. It includes traditional computing devices, such as laptops, tablets, and smartphones, but also includes a growing list of other devices that have recently become Internet enabled. Examples include home appliances, automobiles, wearable electronics, security cameras, and many other things.
In order for a device to be part of the Internet of Things, it must be able to communicate with other devices. Therefore, it requires some type of built-in wired or wireless communication. Most IoT devices are Wi-Fi enabled, but Bluetooth can also be used to transfer data to nearby devices. Anything that connects directly to the Internet must have a unique IP address, which is one of the reasons the adoption of IPv6 has been so important.
IoT devices are commonly called smart devices, since they are able to communicate with other things. For example, you cant control a traditional oven when you are away from home. However, a smart oven that is connected to the cloud can be accessed remotely via a web interface or an app. You can check the status of the oven and start preheating it before you get home. Other smart home devices, such as smart thermostats, light fixtures, wall outlets, and window treatments are considered part of the IoT since they can be accessed and controlled over the Internet.
Along with the capacity to communicate, many IoT devices also include an array of sensors that provide useful information. For example, a wearable device may include sensors that track your heart rate and activity level. It can automatically upload your data to your personal account on the Internet. A security system might include motion detectors that send you an alert if any suspicious activity is recorded. Lighting systems can be automated using sensors that detect how dark it is outside.
While the Internet of Things is still in its infancy, it provides promising opportunities for the future. For example, connecting medical devices to the Internet will make it easier for doctors to track patients health, providing more consistent data and requiring fewer appointments. Agricultural products will be able to self-adjust based on weather forecasts, creating more efficient farming methods. Internet-connected cars will communicate with each other, providing better traffic information and paving the way for self-driving cars. In time, the Internet of Things will become less of an abstract idea and more of a way of life. -
RE: Header
In computing, the term header can refer to a number of different things. Some of the most common uses include 1) a document header, 2) a webpage header, and 3) a file header.
Document Header
Many word processing programs allow you to add a header and/or footer to each page. The header is a small area at the top of the document, while the footer is located at the bottom. Document headers are often used to display the document title or company name at the top of each page. By default, the header content is the same on all pages, so when you edit the header on one page, it will update on all the other pages as well. If you break a document up into sections, you can specify different headers for each section.
Word processors provide different ways of adding and editing header content. Several programs allow you to select View → Headers and Footers to display the header and footer content. Once visible, you can type new content inside each section. Most version of Microsoft Word allow you to simply double-click in the header area to activate the header and add or edit text. If you want to change the height of the header, you can open the Document Formatting window and modify the margins.Webpage Header
The header of a webpage typically includes the company or organizations logo, as well as the main navigation bar. This section, which resides at the top of each webpage, is often part of a template and therefore is the same across all pages within a website or section of a website. HTML 5 even includes a <header> tag that developers can use to specify the header section of each webpage.
NOTE: A webpage header should not be confused with the <head> section in the HTML, which includes the page title, meta tags, and links to referenced files.File Header
A file header is a small amount of data at the beginning of a file. File headers vary between file formats, but they generally define the content of the file and list specific file attributes. For example, the file header of a JPEG image file may include the image format, color profile, and application that created the file. An MP3 audio file may include the song name, tagging format, and compression information. You can view a files header by dragging the file icon to a text editor and reading the first few lines. While binary files may contain a lot of garbled characters, the header information is often still readable.