• International non-profit, professional organization for the advancement of technology related to electricity.

    International non-profit, professional organization for the advancement of technology related to electricity.

  • Adobe Photoshop is the most widely used photo editing software in the world.

    It is also heavily used by graphic designers to create logos, buttons and other graphics for web sites.

    Adobe Photoshop is the most widely used photo editing software in the world.

    It is also heavily used by graphic designers to create logos, buttons and other graphics for web sites.

  • Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN.

    WEP provides security by encrypting data sent wirelessly so that it is protected as it is transmitted from one end point to another.

    WEP is not regarded as very secure in the industry. 

    Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE 802.11 standard to provide the same level of security as the one of a wired LAN.

    WEP provides security by encrypting data sent wirelessly so that it is protected as it is transmitted from one end point to another.

    WEP is not regarded as very secure in the industry. 

  • An Internet Service Provider is a company that lets you access the Internet from your home or office by using a DSL modem, a cable modem or any other device (including sattelite links, etc.).

    They are a gateway between the connection that goes into your home/office and the rest of the Internet.

    An Internet Service Provider is a company that lets you access the Internet from your home or office by using a DSL modem, a cable modem or any other device (including sattelite links, etc.).

    They are a gateway between the connection that goes into your home/office and the rest of the Internet.

  • XML stands for eXtensible Markup Language.

    It is a way of organizing text and/or contents with tags. Tags look like this:

    <sometag>some content</sometag>

    Of course, although possible, this is not designed to be read by humans. It is designed to be processed by machines. Typically one program generates an XML document and another one computes it to some further extent.

    And XML document very much looks like an HTML document, except that the tags are different.

    There are actually many different dialects of XML, each for a different purpose. Each of these dialects has its own tags. And even more tags can be added. Hence the "eXtensible" in the name.

    There is an XML dialect for writing web pages. It is called XHTML. It is basically the same thing as HTML except for minor syntaxic differences. For example in HYML you would write <BR> whereas in XML you would write <br />.

    Other XML dialects include RSS and Atom.

    XML stands for eXtensible Markup Language.

    It is a way of organizing text and/or contents with tags. Tags look like this:

    <sometag>some content</sometag>

    Of course, although possible, this is not designed to be read by humans. It is designed to be processed by machines. Typically one program generates an XML document and another one computes it to some further extent.

    And XML document very much looks like an HTML document, except that the tags are different.

    There are actually many different dialects of XML, each for a different purpose. Each of these dialects has its own tags. And even more tags can be added. Hence the "eXtensible" in the name.

    There is an XML dialect for writing web pages. It is called XHTML. It is basically the same thing as HTML except for minor syntaxic differences. For example in HYML you would write <BR> whereas in XML you would write <br />.

    Other XML dialects include RSS and Atom.

  • Lightweight Directory Access Protocol (LDAP) is an networking protocol for querying and modifying directory services running over TCP/IP.

    Is is often use to verify a login/username against a central directory to allow/reject login and then maybe obtain more detailed information on the user (firstname, lastname, etc.)

    Lightweight Directory Access Protocol (LDAP) is an networking protocol for querying and modifying directory services running over TCP/IP.

    Is is often use to verify a login/username against a central directory to allow/reject login and then maybe obtain more detailed information on the user (firstname, lastname, etc.)

  • The CTA is the primary usier interface element (button, link, form...) that asks the user to take the action the website would like its visitors to take. This results in a "Conversion".

    Examples: "Buy now" button, "Sign up", "Download now", "Subscribe here"...

    The CTA is the primary usier interface element (button, link, form...) that asks the user to take the action the website would like its visitors to take. This results in a "Conversion".

    Examples: "Buy now" button, "Sign up", "Download now", "Subscribe here"...

  • CRO is the method of improving the performance of a website, not by directing more traffic to it, but instead by getting a higher proportion of the existing traffic to convert.

    The underlying assumption is that each website has a purpose and is trying to get its visitors to take some action. Therefore it should have a Call To Action (CTA). CRO uses different methods to get people to follow the CTA.

    Sometimes it means making the CTA more prominent, or more explicit. Sometimes, it means removing distractions or friction in the process.

    CRO is the method of improving the performance of a website, not by directing more traffic to it, but instead by getting a higher proportion of the existing traffic to convert.

    The underlying assumption is that each website has a purpose and is trying to get its visitors to take some action. Therefore it should have a Call To Action (CTA). CRO uses different methods to get people to follow the CTA.

    Sometimes it means making the CTA more prominent, or more explicit. Sometimes, it means removing distractions or friction in the process.

  • Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.

    Network protocol used for automatic configuration of IP computers/devices. A DHCP server provides configuration parameters specific to the DHCP client host requesting, generally, information required by the client host to participate on an IP network. DHCP also provides a mechanism for allocation of IP addresses to client hosts.

  • A suite of protocols developed by Apple for computer networking. It was included in the original Macintosh (1984) and is now deprecated by Apple in favor of TCP/IP networking.

    A suite of protocols developed by Apple for computer networking. It was included in the original Macintosh (1984) and is now deprecated by Apple in favor of TCP/IP networking.