TECH TERMS YOU SHOULD KNOW.



The tech industry has a lot of terminologies, both the everyday terms and more technical and less used terms. Here are some tech terms you most likely have not come across.
1.   Metadata: Metadata simply means information about information. To further explain, it is data that’s described in something like a web page, document, or file. Metadata is ‘behind-the-scenes’ data that is used in a variety of ways by everyone in every business. Information systems, social media, websites, software, music services, and online retailing all use it.
There are around five different types of Metadata and they include:
i.    Descriptive Metadata: Descriptive metadata gives information about a digital object’s intellectual content. The resource identifier, which uniquely identifies the object, is the most significant component of descriptive metadata. Title, author, publication date, subject, publisher, and description are some of the other descriptive metadata elements.
ii.    Rights Metadata: In most cases, rights metadata is just one part of a vast list of ‘data about the data (e.g. title, creator, and date). The copyright status of a digital asset, which could be text, image, video, or audio file, is indicated via rights metadata.
iii.    Metadata For Technical Purposes: Technical metadata is used to document the technical characteristics of digital items or datasets to assist a researcher and/or a repository in managing digital assets through time. The technology and software used to acquire the digital item, file formats for master and descendants, resolutions, colour profiles, storage, and location are all examples of technical metadata.
iv.    Administrative Metadata: tells users about the many types of instructions, rules, and restrictions that have been applied to a file. Administrators can utilize this information to deny file access based on the user’s qualifications.
Administrative metadata is detailed, providing information about a piece of data from start to finish. This allows users to manage a wide variety of data files.
v.    Provenance metadata: Provenance metadata provides users with information about the sources and origins of metadata, enhancing its trust and reliability. The user would be able to determine the origin of a certain information object using provenance.

2.  Consumer Technology, as opposed to technology designed for governmental, military, or commercial use, refers to any form of technology intended for general public use. Consumer technology comes in a wide range of shapes and sizes, and it encompasses a broad range of technological capabilities, including many of the most commonly used items. Examples include Google, Apple, Intel, Samsung, Sony, and other consumer technology companies. Consumer technology includes 5G devices (smartphones and tablets), IoT devices (app-controlled thermostats, locks, and lights), computers (laptops and desktops), self-driving cars, and vehicle technology.
3. Shadow IT: Shadow IT refers to all IT-related operations and purchases that aren’t handled by the IT department. The usage of IT-related gear or software by a department or individual without the knowledge of the organization’s IT or security groups are known as shadow IT. Cloud services, software, and hardware can all be included.
With the computerization of information technology, the expansion of shadow IT has accelerated. Users have grown accustomed to downloading and using cloud-based apps and services to aid them in their work. These purchases could include: Servers, PCs, laptops, tablets, and cell phones are examples of hardware.
Software that has been packaged and sold off the shelf. Software as a service (SaaS), infrastructure as a service (IaaS), and platform as a service (PaaS) are examples of cloud services (PaaS).
4.  PCI DSS (Payment Card Industry Data Security Standard): It’s a collection of guidelines designed to ensure that all businesses that process, store, or transfer credit card data do so in a secure manner. It was introduced on September 7, 2006, to monitor PCI security standards and increase account security throughout the transaction process. The Payment Card Industry Data Security Standard (PCI DSS) is required by the contract for anyone handling cardholder data, whether it be a small firm or a huge multinational.
5.  IMAP (Internet Message View Protocol): IMAP is a widely used email protocol that allows users to access and manipulate email messages stored on a mail server as if they were stored locally on their computer(s). Users can now organize messages into folders, have different client programs track which messages have been viewed, flag communications for follow-up or urgency, and save draft messages on the server. Most IMAP implementations offer multiple logins, allowing the end-user to access the email server from different devices at once.
6.  Peopleware:  The term was first coined by Peter G. Neuman in 1977, and is a word used to refer to one of the three main characteristics of computer technology, the other two being hardware and software, according to Wikipedia. Peopleware covers a wide range of topics related to the role of people in the development and use of computer software and hardware systems, including developer productivity, teamwork, group dynamics, programming psychology, project management, organizational factors, human interface design, and human-machine interaction.
7.  HDMI 2.1: This is the most recent version of the ubiquitous wire, and it represents a significant advancement over HDMI 2.0. It’s already on the greatest TVs, including LG, Samsung, Sony, TCL, Vizio, and other brands. It’s also available on the PlayStation 5 and Xbox Series X, two next-generation game systems. You’ll need a TV that supports at least some HDMI 2.1 features to get the most out of those consoles. In a nutshell, HDMI 2.1 adds new functionality and significantly increases bandwidth. That means greater resolutions, frame rates, and other features. The connector, on the other hand, isn’t changing, so your new HDMI 2.1 gear will work with your existing cables and equipment.

Culled from www.techkord.com

Comments

Popular posts from this blog

U.S. Department of State TechGirls Program 2022

Social Rules to guide you in life.

WAYS TO BUILD YOUR SELF CONFIDENCE.