The document defines the origins and meanings behind common computer-related terms and acronyms. Many terms originated from the names of people involved in early computing projects or were inspired by everyday objects and concepts. For example, Java was originally called Oak but was renamed for its association with coffee, while cookie refers to packets of online information and takes its name from fortune cookies. Several terms like Unix and Linux distributions took their names from animals or people important to their creators. Overall, the document traces the etymologies of over 50 computing terms.
The document discusses a new approach called Operator Compliance Risk Score (OCRS) used by the Driver and Vehicle Standards Agency to identify high-risk operators and reduce enforcement impacts on compliant operators. OCRS determines an operator's risk of non-compliance based on past encounters with the agency. Studies show OCRS targeting increases offending rates from 12.5% to 45% for vehicle conditions and 18% for other offenses like drivers' hours. The agency aims to recognize compliant operators and concentrate resources on serious or serially non-compliant operators through an earned recognition concept and using industry technology to access driver and vehicle data. This could reduce the burden of enforcement on compliant operators and free up resources for higher-risk cases.
This document lists common technology acronyms and their meanings including IOS for Internetwork operating system, GPRS for Global packet radio service, and MP4 for MPEG layer-4 audio format. It also defines several other common tech terms such as JPEG, LED, MAC, PDF, SD, DHTML, SMS, and MMS.
This document provides an overview of performing basic analytics in Necto 16 including:
- Adjusting the grid display and selecting which data to view
- Locating exceptional values by sorting, filtering, and reordering data
- Concentrating on specific data through slicing and selecting dimension members
- Calculating totals and using formulas to derive new values
The agenda covers working with grids, charts, pivoting, drilling up/down, adding dimensions, and saving work. Exercises reinforce skills like adjusting layouts, finding best sellers, and using actions defined in the data cube.
Hadoop as Data Refinery - Steve LoughranJAX London
1. Steve Loughran presented on using Hadoop as a data refinery to store, clean, and refine large amounts of raw data for business intelligence and analytics.
2. A data refinery uses Hadoop to ingest raw data from various sources, clean it, filter it, and forward it to destinations like data warehouses or new agile data systems. It retains raw data for future analysis and offloads work from core data warehouses.
3. Hadoop allows organizations to become more data-driven by supporting ad-hoc queries, storing more historical data affordably, and serving as a platform for data science applications and machine learning. This helps drive innovative business models and competitive advantages.
This document outlines two potential documentary ideas and selects one to pursue. The first idea is about the gluten allergy - what gluten is, how it affects people, and how gluten sufferers manage it. Interviews would be conducted with experts and those with the allergy. The second idea is about the town of High Wycombe - its history and attractions. The document's author chooses to pursue the gluten allergy documentary because they personally suffer from it, giving them expertise on the topic. They also feel it is a unique subject that has not been thoroughly explored before.
The ribbon provides navigation and controls for Necto 16. It consists of categories like Home, Workboard, Insights, etc. Each category contains icons for common tasks in that area, like creating a new workboard, exploring insights, formatting visuals, and more. The ribbon allows customizable organization and hiding of categories to optimize workspace.
This document provides an overview of Necto data security setup and administration. It discusses the different levels of Necto data security including administration, application, and data levels. It also describes the hierarchy and precedence of security levels, with data security being the highest. An example is given of how data security restrictions would override other security settings for a specific user. The agenda covers Necto data security administration, roles, and custom restrictions that can be applied at the dimension and member levels.
The document discusses a new approach called Operator Compliance Risk Score (OCRS) used by the Driver and Vehicle Standards Agency to identify high-risk operators and reduce enforcement impacts on compliant operators. OCRS determines an operator's risk of non-compliance based on past encounters with the agency. Studies show OCRS targeting increases offending rates from 12.5% to 45% for vehicle conditions and 18% for other offenses like drivers' hours. The agency aims to recognize compliant operators and concentrate resources on serious or serially non-compliant operators through an earned recognition concept and using industry technology to access driver and vehicle data. This could reduce the burden of enforcement on compliant operators and free up resources for higher-risk cases.
This document lists common technology acronyms and their meanings including IOS for Internetwork operating system, GPRS for Global packet radio service, and MP4 for MPEG layer-4 audio format. It also defines several other common tech terms such as JPEG, LED, MAC, PDF, SD, DHTML, SMS, and MMS.
This document provides an overview of performing basic analytics in Necto 16 including:
- Adjusting the grid display and selecting which data to view
- Locating exceptional values by sorting, filtering, and reordering data
- Concentrating on specific data through slicing and selecting dimension members
- Calculating totals and using formulas to derive new values
The agenda covers working with grids, charts, pivoting, drilling up/down, adding dimensions, and saving work. Exercises reinforce skills like adjusting layouts, finding best sellers, and using actions defined in the data cube.
Hadoop as Data Refinery - Steve LoughranJAX London
1. Steve Loughran presented on using Hadoop as a data refinery to store, clean, and refine large amounts of raw data for business intelligence and analytics.
2. A data refinery uses Hadoop to ingest raw data from various sources, clean it, filter it, and forward it to destinations like data warehouses or new agile data systems. It retains raw data for future analysis and offloads work from core data warehouses.
3. Hadoop allows organizations to become more data-driven by supporting ad-hoc queries, storing more historical data affordably, and serving as a platform for data science applications and machine learning. This helps drive innovative business models and competitive advantages.
This document outlines two potential documentary ideas and selects one to pursue. The first idea is about the gluten allergy - what gluten is, how it affects people, and how gluten sufferers manage it. Interviews would be conducted with experts and those with the allergy. The second idea is about the town of High Wycombe - its history and attractions. The document's author chooses to pursue the gluten allergy documentary because they personally suffer from it, giving them expertise on the topic. They also feel it is a unique subject that has not been thoroughly explored before.
The ribbon provides navigation and controls for Necto 16. It consists of categories like Home, Workboard, Insights, etc. Each category contains icons for common tasks in that area, like creating a new workboard, exploring insights, formatting visuals, and more. The ribbon allows customizable organization and hiding of categories to optimize workspace.
This document provides an overview of Necto data security setup and administration. It discusses the different levels of Necto data security including administration, application, and data levels. It also describes the hierarchy and precedence of security levels, with data security being the highest. An example is given of how data security restrictions would override other security settings for a specific user. The agenda covers Necto data security administration, roles, and custom restrictions that can be applied at the dimension and member levels.
The overall question addressed here is, “What
implications does the TPP hold for the evolution
of the international trading system?” That system
incorporates not just the multilateral agreements of
the WTO, but also the larger body of trade law that
includes inter alia bilateral and regional RTAs, plurilateral
agreements, and other treaties and institutions. The
evolution of that system is of interest to all countries
no matter what their levels of economic development,
trade strategies, or relationship to the TPP. Both of
the subsidiary questions speak to important aspects
of that overarching question.
The first of these subsidiary questions is, “What does
the TPP imply for the multilateral trading system?”
There are two very distinct perspectives on how
the negotiation of this agreement might affect the
observed loss of momentum in the WTO and the
apparent (but still contested) demise of the Doha
Round of multilateral trade negotiations.
From one perspective, the TPP may be seen as part
of the larger problem facing the trading system. The
agreement is only the latest and largest demonstration
of the divisions within the system. It may be argued
that the world is increasingly being divided between
the countries that are eager to reach new agreements
and the countries that take a more cautious approach,
and to the extent that the more eager countries shift
their attention to RTAs they may be giving up on the
multilateral system. RTA negotiations have grown
both in number and in magnitude over the course of
the WTO period. Reconciling these negotiations with
multilateralism is arguably the greatest challenge for
the WTO membership, and the future of the trading
system depends to a great degree on how that
challenge is met.
El documento presenta tres posibles estrategias de marketing internacional para exportar tomates de México a Suiza: 1) Alianza estratégica a través de una joint venture, la cual permitiría compartir riesgos y recursos para introducir el producto perecedero en un nuevo mercado. 2) Exportación directa trato directo con el importador sin intermediarios para reducir costos. 3) Exportación indirecta a través de un intermediario, lo que implica mayores costos para el importador por las comisiones.
This document discusses unit testing in Laravel. It defines a unit test as checking a single assumption about system behavior. Key reasons for writing unit tests include making development faster and preventing bugs. The document outlines excuses for not testing and best practices like when to implement testing. It describes the typical arrange-act-assert structure of tests and introduces PHPUnit and Laravel testing helpers. Examples show how to test classes, pages, databases, sessions and models using assertions and Laravel helpers.
Elsye Elsye from World Vision Australia completed Salt World Vision PCI-DSS Security Awareness training on March 12, 2013 according to this certification document.
Spirit of PCI DSS by Dr. Anton Chuvakin
PCI compliance is seen by many merchants as “a checklist exercise” which is disconnected from reducing their fraud costs, security risks and other losses. It is sometimes perceived as a painful exercise in futility, enforced by some “higher powers” who don’t care about merchants. This presentation will discuss how to bring back the real spirit of PCI DSS, the spirit of data security, risk reduction and trustworthy business transactions. It will discuss, in particular, how to use the controls of PCI DSS to protect your business from online threats and highly damaging hacker attacks. Moreover, focusing on the spirit of PCI DSS will help merchants to both simplify compliance and improve security, while protecting their customers and their sensitive data and keeping acquirers and brands happy.
- Requirements for PCI DSS, EI3PA, HIPAA, Business Associates, FFIEC and Banking Service Providers - What is Vendor Management - Why is Continual Compliance a challenge in Vendor Management - How to mix technology and manual processes for effective Vendor Management
The document provides a lesson template on business services, including an introduction to key terms like intangibility, inconsistency, and inseparability. It outlines the five "I"s that characterize the nature of services: intangibility, inconsistency, inseparability, inventory, and involvement. The template then lists instructional objectives and outlines a classroom procedure where the teacher would introduce the topic, have group discussions, and summarize the main points about services.
Fusion welding uses heat to melt materials that are then joined together as they solidify. Common fusion welding methods include arc, resistance, oxyfuel, and laser welding. Solid-state welding joins materials without melting using pressure and sometimes heat. Welding allows the production of parts that would be difficult or impossible to form as a single piece through other manufacturing methods. Inspection methods are used to evaluate welds and identify defects.
In this 45 minute webinar ControlCase will discuss the following in the context of PCI DSS and PA DSS
- Network Segmentation
- Card Data Discovery
- Vulnerability Scanning and Penetration Testing
- Card Data Storage in Memory
- Q&A
Color blindness is a deficiency in visual color perception. It is the inability to perceive differences between some colors. Approximately 8% of males and 2.4% of females have some degree of color blindness. There are several types of color blindness including protanopia, deuteranopia, and tritanopia. Designers can improve designs for color blindness by using clear color combinations, supplemental visual elements with colors, and explicitly labeling colors.
Git 201 - A Deeper Look at Git @ KCDC 2016Arthur Doler
You know how to use Git. You can pull a branch, commit your changes, and push it back to Github or Bitbucket. You can use SourceTree to automatically merge well enough, and you even know how to stash your changes.
But what if you want to take things to the next level? Maybe you've heard about the arcane magic known as rebasing, or maybe you (or a coworker) once did something really nasty to your repository and didn't have the first clue how to fix it. Maybe you watched someone use Git on the command line and you want to find out if they're actually a wizard or not. Maybe you just know there's more to Git than you're using, and you want a more detailed walk through the tool. If this describes you, come learn Git from the ground up with me! You'll learn the git command line, how Git represents your files, fun ways to reference various commits, what branches and tags really are, and best of all you'll finally learn how to rebase.
The document discusses the secrets of a healthy lifestyle and emphasizes the importance of eating a balanced diet with vitamins from fruits and vegetables, exercising regularly but in moderation, and spending time outdoors in fresh air. It notes that vitamins from plant foods are essential for health but cannot be replaced by supplements, and that exercise relieves stress, improves mood, and is beneficial for both physical and mental well-being when done in moderation. Maintaining a clean and tidy environment at home is also recommended for overall health.
The document discusses the origins and meanings behind the names of many popular companies. It explains that company names often come from the founders' names, locations, products, or values. For example, Mercedes was named after the founder's daughter, Adobe comes from the river near the founder's house, and Apple came from Steve Jobs' favorite fruit. It also discusses how names like Cisco, Compaq, Intel, and Motorola incorporated aspects of the companies' businesses or technologies.
Net to web: The Links that became a WebJohan Koren
The document provides a history of the development of the Internet from its origins as ARPANET in the 1960s as a military network to connect computers, to the creation of the World Wide Web in 1989-1991. It summarizes key developments like the introduction of email in 1972, the linking of networks in 1975 to create the Internet, and the release of the first graphical web browser, Mosaic, in 1991, which helped popularize the Web. The document outlines important Internet protocols and systems like HTTP, HTML, URLs, and the domain name system that helped structure the early Internet.
The Internet began in 1969 as ARPANET, a project of the U.S. Department of Defense to create a communication network that could withstand nuclear war. In the 1970s, ARPANET expanded and became known as the Internet, connecting universities, research labs, and other networks. The first web browser, Mosaic, was created in 1991, adding graphical capabilities and kickstarting widespread use of the Internet. Today's Internet is a global system of interconnected commercial, government, educational and other networks, with the World Wide Web allowing for sharing of information through hypertext documents and multimedia content.
The document traces the evolution of computers from early counting devices like the abacus to modern cloud computing. It describes key early inventions and pioneers that helped develop computers, such as Charles Babbage's Analytical Engine, Alan Turing's Turing machine, and the first integrated circuits. The document then outlines the major generations of computers from first-generation mainframes to modern fifth-generation systems incorporating artificial intelligence and quantum computing.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET, developed by the US Department of Defense, evolved into the Internet and enabled communication between linked computer networks internationally. The World Wide Web was created by Tim Berners-Lee in 1989-1991 and allowed for sharing of information over the Internet through hyperlinks. Early web browsers like Mosaic helped popularize the graphical web interface.
The document summarizes the history and development of the Internet and World Wide Web. It describes how ARPANET, developed by the US Department of Defense, laid the foundations for the Internet as a network of linked computer networks used for communication. The World Wide Web was developed in the late 1980s and early 1990s by Tim Berners-Lee as a way to access and share information over the Internet using browsers and hyperlinks. Early browsers like Mosaic helped popularize the Web and kickstart the commercial internet. Basic technologies and protocols that underpin the modern internet like URLs, HTTP, HTML and browsers are also outlined.
The overall question addressed here is, “What
implications does the TPP hold for the evolution
of the international trading system?” That system
incorporates not just the multilateral agreements of
the WTO, but also the larger body of trade law that
includes inter alia bilateral and regional RTAs, plurilateral
agreements, and other treaties and institutions. The
evolution of that system is of interest to all countries
no matter what their levels of economic development,
trade strategies, or relationship to the TPP. Both of
the subsidiary questions speak to important aspects
of that overarching question.
The first of these subsidiary questions is, “What does
the TPP imply for the multilateral trading system?”
There are two very distinct perspectives on how
the negotiation of this agreement might affect the
observed loss of momentum in the WTO and the
apparent (but still contested) demise of the Doha
Round of multilateral trade negotiations.
From one perspective, the TPP may be seen as part
of the larger problem facing the trading system. The
agreement is only the latest and largest demonstration
of the divisions within the system. It may be argued
that the world is increasingly being divided between
the countries that are eager to reach new agreements
and the countries that take a more cautious approach,
and to the extent that the more eager countries shift
their attention to RTAs they may be giving up on the
multilateral system. RTA negotiations have grown
both in number and in magnitude over the course of
the WTO period. Reconciling these negotiations with
multilateralism is arguably the greatest challenge for
the WTO membership, and the future of the trading
system depends to a great degree on how that
challenge is met.
El documento presenta tres posibles estrategias de marketing internacional para exportar tomates de México a Suiza: 1) Alianza estratégica a través de una joint venture, la cual permitiría compartir riesgos y recursos para introducir el producto perecedero en un nuevo mercado. 2) Exportación directa trato directo con el importador sin intermediarios para reducir costos. 3) Exportación indirecta a través de un intermediario, lo que implica mayores costos para el importador por las comisiones.
This document discusses unit testing in Laravel. It defines a unit test as checking a single assumption about system behavior. Key reasons for writing unit tests include making development faster and preventing bugs. The document outlines excuses for not testing and best practices like when to implement testing. It describes the typical arrange-act-assert structure of tests and introduces PHPUnit and Laravel testing helpers. Examples show how to test classes, pages, databases, sessions and models using assertions and Laravel helpers.
Elsye Elsye from World Vision Australia completed Salt World Vision PCI-DSS Security Awareness training on March 12, 2013 according to this certification document.
Spirit of PCI DSS by Dr. Anton Chuvakin
PCI compliance is seen by many merchants as “a checklist exercise” which is disconnected from reducing their fraud costs, security risks and other losses. It is sometimes perceived as a painful exercise in futility, enforced by some “higher powers” who don’t care about merchants. This presentation will discuss how to bring back the real spirit of PCI DSS, the spirit of data security, risk reduction and trustworthy business transactions. It will discuss, in particular, how to use the controls of PCI DSS to protect your business from online threats and highly damaging hacker attacks. Moreover, focusing on the spirit of PCI DSS will help merchants to both simplify compliance and improve security, while protecting their customers and their sensitive data and keeping acquirers and brands happy.
- Requirements for PCI DSS, EI3PA, HIPAA, Business Associates, FFIEC and Banking Service Providers - What is Vendor Management - Why is Continual Compliance a challenge in Vendor Management - How to mix technology and manual processes for effective Vendor Management
The document provides a lesson template on business services, including an introduction to key terms like intangibility, inconsistency, and inseparability. It outlines the five "I"s that characterize the nature of services: intangibility, inconsistency, inseparability, inventory, and involvement. The template then lists instructional objectives and outlines a classroom procedure where the teacher would introduce the topic, have group discussions, and summarize the main points about services.
Fusion welding uses heat to melt materials that are then joined together as they solidify. Common fusion welding methods include arc, resistance, oxyfuel, and laser welding. Solid-state welding joins materials without melting using pressure and sometimes heat. Welding allows the production of parts that would be difficult or impossible to form as a single piece through other manufacturing methods. Inspection methods are used to evaluate welds and identify defects.
In this 45 minute webinar ControlCase will discuss the following in the context of PCI DSS and PA DSS
- Network Segmentation
- Card Data Discovery
- Vulnerability Scanning and Penetration Testing
- Card Data Storage in Memory
- Q&A
Color blindness is a deficiency in visual color perception. It is the inability to perceive differences between some colors. Approximately 8% of males and 2.4% of females have some degree of color blindness. There are several types of color blindness including protanopia, deuteranopia, and tritanopia. Designers can improve designs for color blindness by using clear color combinations, supplemental visual elements with colors, and explicitly labeling colors.
Git 201 - A Deeper Look at Git @ KCDC 2016Arthur Doler
You know how to use Git. You can pull a branch, commit your changes, and push it back to Github or Bitbucket. You can use SourceTree to automatically merge well enough, and you even know how to stash your changes.
But what if you want to take things to the next level? Maybe you've heard about the arcane magic known as rebasing, or maybe you (or a coworker) once did something really nasty to your repository and didn't have the first clue how to fix it. Maybe you watched someone use Git on the command line and you want to find out if they're actually a wizard or not. Maybe you just know there's more to Git than you're using, and you want a more detailed walk through the tool. If this describes you, come learn Git from the ground up with me! You'll learn the git command line, how Git represents your files, fun ways to reference various commits, what branches and tags really are, and best of all you'll finally learn how to rebase.
The document discusses the secrets of a healthy lifestyle and emphasizes the importance of eating a balanced diet with vitamins from fruits and vegetables, exercising regularly but in moderation, and spending time outdoors in fresh air. It notes that vitamins from plant foods are essential for health but cannot be replaced by supplements, and that exercise relieves stress, improves mood, and is beneficial for both physical and mental well-being when done in moderation. Maintaining a clean and tidy environment at home is also recommended for overall health.
The document discusses the origins and meanings behind the names of many popular companies. It explains that company names often come from the founders' names, locations, products, or values. For example, Mercedes was named after the founder's daughter, Adobe comes from the river near the founder's house, and Apple came from Steve Jobs' favorite fruit. It also discusses how names like Cisco, Compaq, Intel, and Motorola incorporated aspects of the companies' businesses or technologies.
Net to web: The Links that became a WebJohan Koren
The document provides a history of the development of the Internet from its origins as ARPANET in the 1960s as a military network to connect computers, to the creation of the World Wide Web in 1989-1991. It summarizes key developments like the introduction of email in 1972, the linking of networks in 1975 to create the Internet, and the release of the first graphical web browser, Mosaic, in 1991, which helped popularize the Web. The document outlines important Internet protocols and systems like HTTP, HTML, URLs, and the domain name system that helped structure the early Internet.
The Internet began in 1969 as ARPANET, a project of the U.S. Department of Defense to create a communication network that could withstand nuclear war. In the 1970s, ARPANET expanded and became known as the Internet, connecting universities, research labs, and other networks. The first web browser, Mosaic, was created in 1991, adding graphical capabilities and kickstarting widespread use of the Internet. Today's Internet is a global system of interconnected commercial, government, educational and other networks, with the World Wide Web allowing for sharing of information through hypertext documents and multimedia content.
The document traces the evolution of computers from early counting devices like the abacus to modern cloud computing. It describes key early inventions and pioneers that helped develop computers, such as Charles Babbage's Analytical Engine, Alan Turing's Turing machine, and the first integrated circuits. The document then outlines the major generations of computers from first-generation mainframes to modern fifth-generation systems incorporating artificial intelligence and quantum computing.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET, developed by the US Department of Defense, evolved into the Internet and enabled communication between linked computer networks internationally. The World Wide Web was created by Tim Berners-Lee in 1989-1991 and allowed for sharing of information over the Internet through hyperlinks. Early web browsers like Mosaic helped popularize the graphical web interface.
The document summarizes the history and development of the Internet and World Wide Web. It describes how ARPANET, developed by the US Department of Defense, laid the foundations for the Internet as a network of linked computer networks used for communication. The World Wide Web was developed in the late 1980s and early 1990s by Tim Berners-Lee as a way to access and share information over the Internet using browsers and hyperlinks. Early browsers like Mosaic helped popularize the Web and kickstart the commercial internet. Basic technologies and protocols that underpin the modern internet like URLs, HTTP, HTML and browsers are also outlined.
1) In the late 1950s and 1960s, the US government established ARPA (Advanced Research Projects Agency) in response to the Soviet launch of Sputnik. ARPA funded the creation of ARPANET, one of the first wide-area networks connecting government and university sites.
2) ARPANET used new technologies like packet switching and interface message processors to connect different computer networks. It served as the basis for further networking research and the eventual development of the Internet.
3) In the 1970s and 1980s, networking expanded through the development of protocols like TCP and the rise of personal computers and email. The World Wide Web was created in the early 1990s, allowing for easy navigation of online
Principles It Lesson2 Presentation 052308drussell54
1. Early counting methods used tools like bones with notches and the abacus, an ancient calculating device.
2. Gottfried Leibniz invented an early calculator called the Stepped Reckoner in the 1670s, while Charles Babbage designed the Difference Engine, an early computer, in 1821.
3. Through the 1800s and 1900s, technologies like the telegraph, cash register, and tabulating machines using punched cards improved data processing and led to programmable computers like Konrad Zuse's Z3 in Germany during World War II.
Chapter 15 Networks Read in this book Computer Science Illuminated, .pdfmohdjakirfb
Chapter 15 Networks Read in this book Computer Science Illuminated, Sixth Edition by Dale
and Lewis p.501-510 & 525, then answer the following:
1. What is a protocol in the context of computer networks?
2. Which LAN topology requires the most wiring: the ring, star, or bus? Explain your reasoning.
3. How do you think our lives would be different if Doug Engelbart’s contribution to computing
never happened?
Solution
1)PROTOCOL:
When computers communicate with each other, there needs to be a common set of rules and
instructions that each computer follows. A specific set of communication rules is called a
protocol. Because of the many ways computers can communicate with each other, there are
many different protocols -- too many for the average person to remember. Some examples of
these different protocols include PPP, TCP/IP, SLIP, HTTP, and FTP.
Protocol, in computer science, a set of rules or procedures for transmitting data between
electronic devices, such as computers. In order for computers to exchange information, there
must be a preexisting agreement as to how the information will be structured and how each side
will send and receive it. Without a protocol, a transmitting computer, for example, could be
sending its data in 8-bit packets while the receiving computer might expect the data in 16-bit
packets. Protocols are established by international or industry wide organizations. Perhaps the
most important computer protocol is OSI (Open Systems Interconnection), a set of guidelines for
implementing networking communications between computers. Among the most important sets
of Internetprotocols are TCP/IP, HTTPS, SMTP, and DNS.
2) Star topology requires the most wiring:
In the star topology, cable segments from each computer are connected to a centralized
component called a hub. Signals are transmitted from the sending computer through the hub to
all computers on the network. This topology originated in the early days of computing when
computers were connected to a centralized mainframe computer.
3) Douglas Carl Engelbart (January 30, 1925 – July 2, 2013) was an American engineer and
inventor, and an early computer and Internet pioneer. He is best known for his work on founding
the field of human–computer interaction, particularly while at his Augmentation Research Center
Lab in SRI International, which resulted in the invention of the computer mouse, and the
development of hypertext, networked computers, and precursors to graphical user interfaces.
These were demonstrated at The Mother of All Demos in 1968. Engelbart\'s Law, the
observation that the intrinsic rate of human performance is exponential, is named after him.
Engelbart created the first primitive windowing concept with NLS, but the main way I think his
idea was influential was in using a combination of input devices (keyboard with mouse) with a
graphical user interface whose primary role was allowing people to enter, structure, manipulate,
format, and share text combined with gra.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET, the precursor to the Internet, was developed in the 1960s and 1970s to link computers and allow for communication. It then describes the creation of the World Wide Web in 1989-1991 by Tim Berners-Lee, which added hyperlinking to allow easy navigation between documents on the Internet. The document outlines some of the key technologies and protocols that enabled the growth of the Internet, such as domain names, URLs, HTML, and early web browsers like Mosaic.
Object-oriented programming originated from efforts to build interactive flight simulators in the 1940s-1950s. The Whirlwind computer project at MIT, completed in 1950, was the first fully interactive digital computer and enabled new types of programs like Sketchpad, the first interactive graphical program. Sketchpad used an object-oriented approach and influenced later work on graphical user interfaces and object-oriented languages. In the 1960s, the Simula language introduced features for implementing simulations using objects, influencing Alan Kay who went on to develop Smalltalk, the first successful object-oriented programming language. Nearly all modern programming languages now support object-oriented programming.
Cyber security is a hot topic right now but have you ever wondered how far it goes back or where it all began? Our very own CEO has put together this fascinating presentation explaining the evolution of cyber security.
Even if you don't feel you're 'tech inclined' you will, no doubt, find this presentation riveting and want to share this information with colleagues, as we take you through the defining moments of cyber security since 700BC.
The document describes an early video game called Contra from the 1980s where players control commandos to infiltrate an alien base. It was popular for its two-player simultaneous gameplay, which was uncommon at the time. The document also discusses the origins of the "Hello World" program and identifies Baidu as the dominant search engine in China.
Seven Master of Arts students from Constance at the University of Applied Sciences Communication Design faculty will be working on design research concerning multi-touch interfaces during summer term 2008. Faces and history.
The document provides a history of the development of the Internet and World Wide Web. It discusses how ARPANET was developed in the 1960s as a military network and how this eventually led to the commercialization of the Internet in the 1970s. It also outlines the development of early online services like BBS and Gopher, as well as the invention of the World Wide Web by Tim Berners-Lee in 1989-1991, which added hyperlinking to online documents and popularized accessing information over the Internet.
The document summarizes important inventors and developments in the computer field, including:
- Charles Babbage invented the Analytical Engine in 1822, laying the foundations for modern computers. Alan Turing developed the Turing Machine and helped establish the concept of the algorithm.
- Important early computers included the Z1, Z2, and Z3 by Konrad Zuse, the Atanasoff-Berry Computer by John Vincent Atanasoff & Clifford Berry, and ENIAC developed for the US Army by John Mauchly and J. Presper Eckert.
- Major advances included the first personal computer by Henry Roberts in 1974, the first laptop by IBM in 1975, the first Apple computer by
The Four Main Components And History Of Computers discusses the history and components of computers. It describes the four main components - input devices, output devices, secondary storage, and the processor and primary storage. Input devices allow users to input data, like keyboards and mice. Output devices send data from the computer to the user, like monitors and printers. Secondary storage serves as additional storage beyond the primary storage and includes hard drives. The processor and primary storage temporarily hold data and files while the computer is running.
The document traces the history and evolution of computing devices from ancient counting tools like the abacus to modern computers. It describes early mechanical calculating devices invented by Pascal and Babbage in the 1600s-1800s. The development of programming by Ada Lovelace and Boolean logic in the 1800s laid the foundations for modern computing. Key innovations like the tabulator, vacuum tube, Turing machine, and integrated circuit expanded computing's capabilities. The document outlines the development of early computers like ENIAC and Mark I in the 1940s-1950s and the rise of programming languages. It traces the progression from mainframes to minicomputers and microprocessors, leading to personal computers in the 1970s and beyond.
The document provides a summary of the history of software engineering from the 19th century to present day. It discusses how:
- The first computers were human "computers", mostly women, who performed calculations by hand. The term "software" was coined in the 1940s.
- The origin of the term "software engineering" is debated but it was used in the 1960s to distinguish the work of building software systems from computer science and hardware engineering.
- Early programming involved humans organizing complexity through techniques like flowcharts. Languages like Fortran automated programming and made it possible to write software independent of hardware.
- Large software projects in defense and aerospace in the 1960s highlighted the need for software engineering
1. A[edit]
ABEND — originally from an IBM System/360 error message, short for "abnormal
end". Jokingly reinterpreted as German Abend ("evening"), because "it is what
system operators do to the machine late on Friday when they want to call it a
day."[1]
Ada — named after Ada Lovelace, who is considered by many to be the first
programmer.
Apache — originally chosen from respect for the Native American Indian tribe of
Apache. It was suggested that the name was appropriate, as Apache began as a
series of patches to code written for NCSA's HTTPd daemon. The result was "a
patchy" server.[2]
AWK — composed of the initials of its authors Aho, Weinberger, and Kernighan.[3]
B[edit]
The first case of an actual computer bug, a moth trapped in a relay of the
Harvard Mark II
B — probably a contraction of "BCPL", reflecting Ken Thompson's efforts to
implement a smaller BCPL in 8 KB of memory on a DEC PDP-7.[citation needed] Or,
named after Bon.[4]
biff — named after a dog known by the developers at Berkeley, who — according to
the UNIX manual page — died on 15 August 1993, at the age of 15, and belonged to
a certain Heidi Stettner. Some sources[5][6] report that the dog would bark at
the mail carrier, making it a natural choice for the name of a mail notification
system. The Jargon File contradicts[7] this description, but confirms at least
that the dog existed.
bit — first used by Claude E. Shannon in his seminal 1948 paper A Mathematical
Theory of Communication. Shannon's "bit" is a portmanteau of "binary digit". He
attributed its origin to John W. Tukey,[8] who had used the word in a Bell Labs
memo of 9 January 1947.[9]
Bon — created by Ken Thompson and named either after his wife Bonnie, or else
after "a religion whose rituals involve the murmuring of magic formulas" (a
reference to the Tibetan native religion Bön).[4]
booting or bootstrapping — from the phrase "to pull oneself up by one's
bootstraps", originally used as a metaphor for any self-initiating or self-
sustaining process. Used in computing due to the apparent paradox that a
computer must run code to load anything into memory, but code cannot be run
until it is loaded.
bug — often (but erroneously) credited to Grace Hopper. In 1946, she joined the
Harvard Faculty at the Computation Laboratory where she traced an error in the
Harvard Mark II to a moth trapped in a relay. This bug was carefully removed and
taped to the log book. However, use of the word 'bug' to describe defects in
mechanical systems dates back to at least the 1870s, perhaps especially in
Scotland.[citation needed] Thomas Edison, for one, used the term in his
notebooks and letters.[10]
byte — coined by Werner Buchholz in 1956 during the early design phase for the
IBM Stretch computer.[11]
C[edit]
Computer room at Dryden Flight Research Center, 1949
C — a programming language.
Dennis Ritchie, having improved on the B language, called his creation New B. He
later renamed it C. (See also D).
C++ — an object-oriented programming language, a successor to the C programming
language.
C++ creator Bjarne Stroustrup called his new language "C with Classes" and then
"new C". The original language began to be called "old C" which was considered
insulting to the C community. At this time Rick Mascitti suggested the name C++
as a successor to C. In C the '++' operator increments the value of the variable
it is appended to, thus C++ would increment the value of C.
computer — from the human computers who carried out calculations mentally and
possibly with mechanical aids, now replaced by electronic programmable
computers.
cookie — a packet of information that travels between a browser and the web
server.
2. The term was coined by web browser programmer Lou Montulli after the term "magic
cookies" used by Unix programmers. The term "magic cookie" in turn derives from
"fortune cookie", a cookie with an embedded message.
D[edit]
D — a programming language.
Designed by Walter Bright as an improved C, avoiding many of the design problems
of C (e.g., extensive pointer manipulation, unenforced array boundaries, etc.).
daemon — a process in an operating system that runs in the background.
It is falsely considered an acronym for Disk And Execution Monitor.[by whom?]
According to the original team that introduced the concept, "the use of the word
daemon was inspired by the Maxwell's demon of physics and thermodynamics (an
imaginary agent which helped sort molecules with differing velocities and worked
tirelessly in the background)"[citation needed] The term was embraced, and
possibly popularized[citation needed], by the Unix operating systems which
supported multiple background processes: various local (and later Internet)
services were provided by daemons. This is exemplified by the BSD mascot, John
Lasseter's drawing of a friendly imp.
Debian — a Linux distribution.
A portmanteau of the names Ian Murdock, the Debian Project creator, and Debra
Lynn, Ian's then girlfriend and future wife.[12][13]
E[edit]
Ethernet — a computer networking technology.
According to Robert Metcalfe (one of its initial developers), he devised the
name in an early company memo as an endocentric compound of "luminiferous
ether"—the "substance" that was widely believed to be the medium through which
electromagnetic radiation propagated in the late 19th century—and "net", short
for "network".[14] When the networking team would describe data flowing into the
network infrastructure, they would routinely describe it as data packets going
"up into the ether".[15]
F[edit]
finger — Unix command that provides information about users logged into a
system.
Les Earnest wrote the finger program in 1971 to provide for users who wanted
information about other users on a network or system. Before the finger program,
the only way to get this information was with a who program that showed IDs and
terminal line numbers for logged-in users; people used to run their fingers down
the "who" list. Earnest named his program after this phenomenon.[citation
needed]
foobar — from the U.S. Army slang acronym, FUBAR. Both foo and bar are commonly
used as metasyntactic variables.[16]
G[edit]
Gentoo Linux is named after the penguin
Gentoo — a Linux distribution.
Named after a variety of penguin, the universal Linux mascot.
GNU — a project with an original goal of creating a free operating system.
The gnu is also a species of African antelope. The founder of the GNU project
Richard Stallman liked the name because of the humour associated with its
pronunciation, and was also influenced by The Gnu Song,[17] by Flanders and
Swann, which is sung by a gnu. It is also an early example of a recursive
acronym: "GNU's Not Unix".[18]
Google — a search engine.
The name started as an exaggerated boast about the amount of information the
search engine would be able to search. It was originally named 'Googol', a word
for the number represented by 1 followed by 100 zeros. The word was originally
invented by Milton Sirotta, nephew of mathematician Edward Kasner, in 1938
during a discussion of large numbers and exponential notation.
Gopher — an early distributed document search and retrieval network protocol on
the Internet.
The source of the name is claimed to be three-fold: first, that it is used to
"go-for" information; second, that it does so through a menu of links analogous
to gopher holes; and third, that the mascot of the protocol authors'
organization, the University of Minnesota, is Goldy the Gopher.[citation needed]
grep — a Unix command line utility
3. The name comes from a command in the Unix text editor ed that takes the form
g/re/p meaning search globally for a regular expression and print lines where
instances are found.[19] "Grep" like "Google" is often used as a verb, meaning
"to search".
H[edit]
Hotmail — free email service, now part of MSN.
Founder Jack Smith got the idea of accessing e-mail via the web from a computer
anywhere in the world. When Sabeer Bhatia came up with the business plan for the
mail service, he tried all kinds of names ending in 'mail' and finally settled
for Hotmail as it included the letters "HTML" — the markup language used to
write web pages. It was initially referred to as HoTMaiL with selective upper
casing.
I[edit]
i18n — short for "internationalization".
"18" is for the number of letters between the i and the n. The term l10n (for
localization) has failed to catch on to the same degree, but is used by some.
[who?][citation needed]
ICQ — an instant messaging service.
ICQ is not an initialism. It is a play on the phrase "I seek you" (similar to CQ
in ham radio usage).[citation needed]
ID10T - pronounced "ID ten T" - is a code frequently used by a customer service
representative (CSR) to annotate their notes and identify the source of a
problem as the person who is reporting the problem rather than the system being
blamed. This is a thinly veiled reference to the CSR's opinion that the person
reporting the problem is an IDIOT. Example: Problem reported caused by ID10T, no
resolution possible. See also PEBKAC.[citation needed]
J[edit]
Java logo and wordmark.svg
Jakarta Project — a project constituted by Sun and Apache to create a web server
for Java servlets and JSPs.
Jakarta was the name of the conference room at Sun where most of the meetings
between Sun and Apache took place. The conference room was most likely named
after Jakarta, the capital city of Indonesia, which is located on the northwest
coast of the island of Java.
Java — a programming language.
Originally called "D", but with the connotation of a near-failing mark on a
report card the language was renamed Oak by Java-creator James Gosling, from the
tree that stood outside his window. The programming team at Sun had to look for
a substitute name as there was already another programming language called Oak.
"Java" was selected from a list of suggestions, primarily because it is a
popular slang term for coffee, especially that grown on the island of Java. As
the programmers drank a lot of coffee, this seemed an appropriate name. Many
people mistakenly think that Java is an acronym and spell it JAVA. When one of
the original Java programmers from Sun was asked to define JAVA he said it stood
for nothing, but if it must stand for something: "Just Another Vague Acronym."
JavaScript — a programming language.
It was originally developed by Brendan Eich of Netscape under the name "Mocha",
which was later renamed to "LiveScript", and finally to "JavaScript".[20] The
change of name from LiveScript to JavaScript roughly coincided with Netscape
adding support for Java technology in its Netscape Navigator web browser.
JavaScript was first introduced and deployed in the Netscape browser version
2.0B3 in December 1995. The naming has caused confusion, giving the impression
that the language is a spin-off of Java, and it has been characterized by many
as a marketing ploy by Netscape to give JavaScript the cachet of what was then
the hot new web-programming language.[21][22]
K[edit]
Kerberos — a computer network authentication protocol that is used by both
Windows 2000 and Windows XP as their default authentication method.
When created by programmers at MIT in the 1970s, they wanted a name that
suggested high security for the project, so they named it after Kerberos, in
Greek mythology the three-headed dog guarding the gates of Hades. The reference
to Greek mythology is most likely because Kerberos was developed as part of
Project Athena.[citation needed]
L[edit]
4. Linux — an operating system kernel, and the common name for the operating system
which uses it.
Linux creator Linus Torvalds originally used the Minix operating system on his
computer, didn't like it, liked MS-DOS less, and started a project to develop an
operating system that would address the problems of Minix. Hence the working
name was Linux (Linus' Minix). Originally, however, Linus had planned to have it
named Freax (free + freak + x). His friend Ari Lemmke encouraged Linus to upload
it to a network so it could be easily downloaded. Ari gave Linus a directory
called linux on his FTP server, as he did not like the name Freax.
Lisa — A personal computer designed at Apple Computer during the early 1980s.
Apple stated that Lisa was an acronym for Local Integrated Software
Architecture; however, it is often inferred that the machine was originally
named after the daughter of Apple co-founder Steve Jobs, and that this acronym
was invented later to fit the name. Accordingly, two humorous suggestions for
expanding the acronym included Let's Invent Some Acronyms and Let's Invent Silly
Acronyms.
liveware - computer personnel.
A play on the terms "software" and "hardware". Coined in 1966, the word
indicates that sometimes the computer problem is not with the computer itself,
but with the user.
Lotus Software — Lotus founder Mitch Kapor got the name for his company from
'The Lotus Position' ('Padmasana' in Sanskrit). Kapor used to be a teacher of
Transcendental Meditation technique as taught by Maharishi Mahesh Yogi.
M[edit]
The original apple McIntosh
Macintosh, Mac — a personal computer from Apple Computer.
From McIntosh, a popular type of apple.
N[edit]
Nerd — A colloquial term for a computer person, especially an obsessive,
singularly focused one.
Earlier spelling of the term is "Nurd" and the original spelling is "Knurd", but
the pronunciation has remained the same. The term originated at Rensselaer
Polytechnic Institute in the late 1940s.[citation needed] Students who partied,
and rarely studied were called "Drunks", while the opposite — students who never
partied and always studied were "Knurd" ("Drunk" spelled backward). The term was
also (independently) used in a Dr. Seuss book, and on the TV show Happy Days,
giving it international popularity.[citation needed]
O[edit]
OLIVER - CICS interactive test/debug software.
The name of this online interactive software - that prevented CICS system abends
caused by applications programs - did not originate from "Online Verification"
or similar. It was the name of the author's son Oliver.
Oracle — a relational database management system (RDBMS).
Larry Ellison, Ed Oates and Bob Miner were working on a consulting project for
the CIA (Central Intelligence Agency). The code name for the project was called
Oracle (the CIA evidently saw this as a system that would give answers to all
questions). The project was designed to use the newly written SQL database
language from IBM. The project eventually was terminated but they decided to
finish what they started and bring it to the world. They kept the name Oracle
and created the RDBMS engine.
P[edit]
The U.S. 'Pac-Man' and Japanese 'Puck-Man' arcade cabinets
Pac-Man — a video arcade game.
The term comes from paku paku which is a Japanese onomatopoeia used for noisy
eating; similar to chomp chomp. The game was released in Japan with the name
Puck-Man, and released in the US with the name Pac-Man, fearing that kids may
deface a Puck-Man cabinet by changing the P to an F.
PCMCIA — the standards body for PC card and ExpressCard, expansion card form
factors.
The Personal Computer Memory Card International Association is an international
standards body that defines and promotes standards for expansion devices such as
modems and external hard disk drives to be connected to notebook computers. Over
5. time, the acronym PCMCIA has been used to refer to the PC card form factor used
on notebook computers. A twist on the acronym is People Can't Memorize Computer
Industry Acronyms.
PEBKAC - an acronym for "Problem Exists Between Keyboard And Chair", which is a
code frequently used by a customer service representative (CSR) to annotate
their notes and identify the source of a problem as the person who is reporting
the problem rather than the system being blamed. This is a thinly veiled
reference to the CSR's opinion that the person reporting the problem is the
problem. Example: PEBKAC, no resolution possible. See also ID10T.
Pentium — a series of microprocessors from Intel.
The fifth microprocessor in the 80x86 series. It would have been called i586 or
80586, but Intel decided to name it Pentium (penta = five) after it lost a
trademark infringement lawsuit against AMD due to a judgment that numbers like
"286", "386", and "486" cannot be trademarked. According to Intel, Pentium
conveys a meaning of strength, like titanium.[citation needed]
Since some early Pentium chips contained a mathematical precision error, it has
been jokingly suggested that the reason for the chip being named Pentium rather
than 586 was that Intel chips would calculate 486 + 100 = 585.99999948.
Perl — an interpreted scripting language.
Perl was originally named Pearl, after the "pearl of great price" of Matthew
13:46.[citation needed] Larry Wall, the creator of Perl, wanted to give the
language a short name with positive connotations and claims to have looked at
(and rejected) every three- and four-letter word in the dictionary. He even
thought of naming it after his wife Gloria. Before the language's official
release Wall discovered that there was already a programming language named
Pearl, and changed the spelling of the name. Although the original manuals
suggested the backronyms "Practical Extraction and Report Language" and
"Pathologically Eclectic Rubbish Lister", these were intended humorously.
[citation needed]
PHP — a server-side scripting language
Originally called "Personal Home Page Tools" by creator Rasmus Lerdorf, it was
rewritten by developers Zeev Suraski and Andi Gutmans who gave it the recursive
name "PHP Hypertext Preprocessor". Lerdorf currently insists the name should not
be thought of as standing for anything, for he selected "Personal Home Page" as
the name when he did not foresee PHP evolving into a general-purpose programming
language.
Pine — e-mail client.
Many people believe that Pine stands for "Pine Is Not Elm". However, one of its
original authors, Laurence Lundblade, insists this was never the case and that
it started off simply as a word and not an acronym; his first choice of a
backronym for pine would be "Pine Is Nearly Elm". Over time it was changed to
mean Program for Internet News and E-mail.[23]
ping — a computer network tool used to detect hosts.
The author of ping, Mike Muuss, named it after the pulses of sound made by a
sonar called a "ping". Later Dave Mills provided the backronym "Packet Internet
Groper".
Python — an interpreted scripting programming language.
Named after the television series Monty Python's Flying Circus.[citation needed]
R[edit]
Radio button — a GUI widget used for making selections.
Radio buttons got their name from the preset buttons in radio receivers. When
one used to select preset stations on a radio receiver physically instead of
electronically, depressing one preset button would pop out whichever other
button happened to be pushed in.
Red Hat Linux — a Linux distribution from Red Hat.
Company founder Marc Ewing was given the Cornell lacrosse team cap (with red and
white stripes) by his grandfather while at college. People would turn to him to
solve their problems, and he was referred to as "that guy in the red hat". He
lost the cap and had to search for it desperately. The manual of the beta
version of Red Hat Linux had an appeal to readers to return the hat if found by
anyone.
RSA — an asymmetric algorithm for public key cryptography.
Based on the surnames of the authors of this algorithm — Ron Rivest, Adi Shamir
and Len Adleman.
6. S[edit]
Samba — a free implementation of Microsoft's networking protocol.
The name samba comes from inserting two vowels into the name of the standard
protocol that Microsoft Windows network file system use, called SMB (Server
Message Block). The author searched a dictionary using grep for words containing
S M and B in that order; the only matches were Samba and Salmonberry.
shareware — coined by Bob Wallace to describe his word processor PC-Write in
early 1983.[citation needed] Before this Jim Knopf (also known as Jim Button)
and Andrew Fluegelman called their distributed software "user supported
software" and "freeware" respectively, but it was Wallace's terminology that
prevailed.
SIMON - batch interactive test/debug software.
The name of this instruction set simulator software - that allowed batch
application programs to be tested interactively from online terminals - did not
originate from "Simulation Online" or similar. It was the name of the author's
other son (see also OLIVER).
spam — unwanted repetitious messages, such as unsolicited bulk e-mail.
The term spam is derived from the Monty Python SPAM sketch, set in a cafe where
everything on the menu includes SPAM luncheon meat. While a customer plaintively
asks for some kind of food without SPAM in it, the server reiterates the SPAM-
filled menu. Soon, a chorus of Vikings join in with a song: "SPAM, SPAM, SPAM,
SPAM, SPAM, lovely SPAM, wonderful SPAM", over and over again, drowning out all
conversation.
SPIM — a simulator for a virtual machine closely resembling the instruction set
of MIPS processors, is simply MIPS spelled backwards. In recent time, spim has
also come to mean SPam sent over Instant Messaging.
Swing — a graphics library for Java.
Swing was the code-name of the project that developed the new graphic components
(the successor of AWT). It was named after swing, a style of dance band jazz
that was popularized in the 1930s and unexpectedly revived in the 1990s.
Although an unofficial name for the components, it gained popular acceptance
with the use of the word in the package names for the Swing API, which begin
with javax.swing.[citation needed]
T[edit]
Tomcat — a web server from the Jakarta Project.
Tomcat was the code-name for the JSDK 2.1[clarification needed] project inside
Sun.[citation needed] Tomcat started off as a servlet specification
implementation by James Duncan Davidson who was a software architect at Sun.
Davidson had initially hoped that the project would be made open-source, and
since most open-source projects had O'Reilly books on them with an animal on the
cover, he wanted to name the project after an animal. He came up with Tomcat
since he reasoned the animal represented something that could take care of and
fend for itself.
troff — a document processing system for Unix.
Troff stands for "typesetter roff", although many people have speculated that it
actually means "Times roff" because of the use of the Times font family in troff
by default. Troff has its origins from Roff, an earlier formatting program,
whose name is a contraction of "run off".[citation needed]
Trojan horse — a malicious program that is disguised as legitimate software.
The term is derived from the classical myth of the Trojan Horse. Analogously, a
Trojan horse appears innocuous (or even to be a gift), but in fact is a vehicle
for bypassing security.
Tux — The penguin now commonly regarded as the most famous logo of the Linux
Kernel and its deviants.
The logo was originally created by Larry Ewing in 1996 as an entry in a Linux
Logo competition. The creator of Linux, Linus Torvalds was bitten by a little
penguin during a visit to Canberra Zoo in 1993, which made the penguin his
"favourite" animal. The word Tux apparently comes from "(T)orvalds (U)ni(X)".
[citation needed][original research?]
U[edit]
Ubuntu Linux — a Debian-based Linux distribution sponsored by Canonical Ltd.
Derived from ubuntu, a South African ideology.
Unix — an operating system.
When Bell Labs pulled out of the MULTICS (MULTiplexed Information and Computing
7. System) project, which was originally a joint Bell Labs/GE/MIT project, Ken
Thompson of Bell Labs, soon joined by Dennis Ritchie, wrote a simpler version of
the operating system for a spare DEC minicomputer, allegedly found in a
corridor. They needed an OS to run the game Space Travel, which had been
compiled under MULTICS. The new OS was called UNICS — UNiplexed Information and
Computing System by Brian Kernighan.
V[edit]
vi — a text editor,
Initialism for visual, a command in the ex editor which helped users to switch
to the visual mode from the ex mode. the first version was written by Bill Joy
at UC Berkeley.
Vim — a text editor.
Acronym for Vi improved after Vim added several features over the vi editor. Vim
however had started out as an imitation of Vi and was expanded as Vi imitation.
Virus — a piece of program code that spreads by making copies of itself.
The term virus was first used as a technical computer science term by Fred Cohen
in his 1984 paper "Computer Viruses Theory and Experiments", where he credits
Len Adleman with coining it. Although Cohen's use of virus may have been the
first academic use, it had been in the common parlance long before that. A mid-
1970s science fiction novel by David Gerrold, When H.A.R.L.I.E. was One,
includes a description of a fictional computer program called VIRUS that worked
just like a virus (and was countered by a program called ANTIBODY). The term
"computer virus" also appears in the comic book "Uncanny X-Men" No. 158,
published in 1982. A computer virus's basic function is to insert its own
executable code into that of other existing executable files, literally making
it the electronic equivalent to the biological virus, the basic function of
which is to insert its genetic information into that of the invaded cell,
forcing the cell to reproduce the virus.
W[edit]
Wiki or WikiWiki — a hypertext document collection or the collaborative software
used to create it.
Coined by Ward Cunningham, the creator of the wiki concept, who named them for
the "wiki wiki" or "quick" shuttle buses at Honolulu Airport. Wiki wiki was the
first Hawaiian term he learned on his first visit to the islands. The airport
counter agent directed him to take the wiki wiki bus between terminals.
Worm — a self-replicating program, similar to a virus.
The name 'worm' was taken from a 1970s science fiction novel by John Brunner
entitled The Shockwave Rider. The book describes programs known as "tapeworms"
which spread through a network for the purpose of deleting data. Researchers
writing an early paper on experiments in distributed computing noted the
similarities between their software and the program described by Brunner, and
adopted that name.
WYSIWYG - describes a system in which content during editing appears very
similar to the final product.
Acronym for What You See Is What You Get, the phrase was originated by a
newsletter published by Arlene and Jose Ramos, called WYSIWYG. It was created
for the emerging Pre-Press industry going electronic in the late 1970s.
X[edit]
X Window System — a windowing system for computers with bitmap displays.
X derives its name as a successor to a pre-1983 window system called the W
Window System.
Y[edit]
Yahoo! — internet portal and web directory.
Yahoo!'s history site says the name is an acronym for "Yet Another Hierarchical
Officious Oracle", but some remember that in its early days (mid-1990s), when
Yahoo! lived on a server called akebono.stanford.edu, it was glossed as "Yet
Another Hierarchical Object Organizer." The word "Yahoo!" was originally
invented by Jonathan Swift and used in his book Gulliver's Travels. It
represents a person who is repulsive in appearance and action and is barely
human. Yahoo! founders Jerry Yang and David Filo selected the name because they
considered themselves yahoos.
Z[edit]
zip — a file format, also used as a verb to mean compress.
The file format was created by Phil Katz, and given the name by his friend
8. Robert Mahoney. The compression tool Phil Katz created was called PKZIP. Zip
means "speed", and they wanted to imply their product would be faster than ARC
and other compression formats of the time.