Jump to content

Welcome to Geeks to Go - Register now for FREE

Need help with your computer or device? Want to learn new tech skills? You're in the right place!
Geeks to Go is a friendly community of tech experts who can solve any problem you have. Just create a free account and post your question. Our volunteers will reply quickly and guide you through the steps. Don't let tech troubles stop you. Join Geeks to Go now and get the support you need!

How it Works Create Account

Geeks Talk

* * * * * 6 votes

  • Please log in to reply




  • Member
  • PipPipPipPip
  • 1,357 posts
This is a little something so that you can understand terms used by geeks better:

An individual who:
* Oversees the operation of a network.
* Is responsible for installing programs on a network and configuring them for distribution to workstations.
* May also update security settings on workstations.

A subcategory of a security policy that pertains to computer viruses.

Bits per second (bps):
A measure of the speed at which a device, such as a modem, can transfer bits of data.

A programming error in a software program that can have unwanted side effects. Some examples include Various web browser security problems and Y2K software problems.

A security feature that lets a host disconnect a remote caller after a successful connection and then recall the remote computer, either for security verification or financial responsibility.

The discrimination between lowercase and uppercase characters.

Cryptographic systems use this file as proof of identity. It contains a user's name and public key.

Communications port (COM port):
Also called a serial port. The COM port is a location for sending and receiving serial data transmissions. The ports are referred to as COM1, COM2, COM3, and COM4.

To convert a high-level script into a low-level set of commands that can be executed or run. Syntax errors are discovered when a script is being compiled.

The successful establishment of a communications link.

Data transfer:
The movement of information from one location to another. The transfer speed is called the data rate or data transfer rate.

A group of computers or devices that shares a common directory database and is administered as a unit. On the Internet, domains organize network addresses into hierarchical subsets. For example, the .com domain identifies host systems used for commercial business.

To transfer data from one computer to another, usually over a modem or network. Download usually refers to the act of transferring a file from the Internet, a Bulletin Board System (BBS), or an online service to an individual's computer.

A program that interprets commands for transferring to and from peripheral devices and the CPU.

A method of scrambling or encoding data to prevent unauthorized users from reading or tampering with the data. Only individuals with access to a password or key can decrypt and use the data. The data can include messages, files, folders, or disks.

A program or technique that takes advantage of a vulnerability in software and that can be used for breaking security, or otherwise attacking a host over the network.

eXtensible Markup Language (XML):
The common language of the Web used to exchange information.

File Allocation Table (FAT):
File Allocation Table. FAT can refer to three different types of partitions: FAT12, FAT16, and FAT16b. FAT16b is the most common type, and is used for partitions that are larger than 32 MB. FAT12 and FAT16 partitions were used with MS-DOS 5.0, and are still used with Windows 98 (depending on the partition size). The FAT file system format is used and recognized by DOS, Windows 3.x, Windows 95, Windows NT, OS/2, and nearly all other operating systems.

32-bit File Allocation Table. File system format recognized by Windows 95 B (or later versions) and Windows NT 5(or later versions).

File transfer:
The process of using communications to send a file from one computer to another. In communications, a protocol must be agreed upon by sending and receiving computers before a file transfer can occur.

Internet Protocol (IP) address:
Identifies a workstation on a TCP/IP network and specifies routing information. Each workstation on a network must be assigned a unique IP address, which consists of the network ID, plus a unique host ID assigned by the network administrator. This address is usually represented in dot-decimal notation, with the decimal values separated by a period (for example

Joke Program:
Programs that alter or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Joke programs generally do not themselves engage in the practice of gathering or distributing information from the user's computer.

Local Area Network (LAN):
A group of computers and other devices in a relatively limited area (such as a single building) that are connected by a communications link, which enables any device to interact with any other device on the network.

A group of computers and associated devices connected by communications facilities (both hardware and software) to share information and peripheral devices, such as printers and modems. Also see LAN.

A unique string of characters that a user types as an identification code to restrict access to computers and sensitive files. The system compares the code against a stored list of authorized passwords and users. If the code is legitimate, the system allows access at the security level approved for the owner of the password.

A basic Internet program that lets you verify that a particular Internet address exists and can accept requests. The act of using the ping utility or command. Pinging is diagnostically used to ensure that a host computer, which you are trying to reach, actually operates.

A hardware location for passing data in and out of a computing device. Personal computers have various types of ports, including internal ports for connecting disk drives, monitors, and keyboards, as well as external ports, for connecting modems, printers, mouse devices, and other peripheral devices.

In TCP/IP and UDP networks, port is the name given to an endpoint of a logical connection. Port numbers identify types of ports. For example, both TCP and UDP use port 80 for transporting HTTP data. A threat may attempt to use a particular TCP/IP port.

A set of rules enabling computers or devices to exchange data with one another with as little error as possible. The rules govern issues, such as error checking and data compression methods. Also see communications protocol.

A software agent, often a firewall mechanism, which performs a function or operation on behalf of another application or system while hiding the details involved.

Remote Access:
Programs that allow one computer to access another computer (or facilitate such access) without explicit authorization when an access attempt is made. Once access is gained, usually over the Internet or by direct dial access, the remote access program can attack or alter the other computer. It may also have the ability to gather personal information, or infect or delete files. They may also create the risk that third party programs can exploit its presence to obtain access. Such remote access programs generally:

* Attempt to remain unnoticed, either by actively hiding or simply not making their presence on a system known to the user, and/or
* Attempt to hide any evidence of their being accessed remotely over a network or Internet

Means by which these programs provide access may include notifying a remote host of the machine by sending its address or location, or employing functionality that wholly or partially automates access to the computer on which the program is installed.

Serial port:
Also known as a communications port or COM port. The serial port is a location for sending and receiving serial data transmissions. DOS references these ports by the names COM1, COM2, COM3, and COM4.

Programs that have the ability to scan systems or monitor activity and relay information to other computers or locations in cyber-space. Among the information that may be actively or passively gathered and disseminated by Spyware: passwords, log-in details, account numbers, personal information, individual files or other personal documents. Spyware may also gather and distribute information related to the user's computer, applications running on the computer, Internet browser usage or other computing habits.

Spyware frequently attempts to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. Spyware can be downloaded from Web sites (typically in shareware or freeware), email messages, and instant messengers. Additionally, a user may unknowingly receive and/or trigger spyware by accepting an End User License Agreement from a software program linked to the spyware or from visiting a website that downloads the spyware with or without an End User License Agreement.

Programs that track system activity, gather system information, or track user habits and relay this information to third-party organizations. The information gathered by such programs is neither personally identifiable nor confidential.

Trackware programs are installed with the user's consent and may also be packaged as part of other software installed by the user.

Transmission Control Protocol/Internet Protocol (TCP/IP):
A common set of protocols used on the Internet to link dissimilar computers across many kinds of networks.

To send a file from one computer to another via modem, network, or serial cable. With a modem-based communications link, the process generally involves the requesting computer instructing the remote computer to prepare to receive the file on its disk and wait for the transmission to begin. Also see download.

Viruses, Worms and Trojan Horses:
A virus is a program or code that replicates itself onto other files with which it comes in contact; that is, a virus can infect another program, boot sector, partition sector, or a document that supports macros, by inserting itself or attaching itself to that medium. Most viruses only replicate, though many can do damage to a computer system or a user's data as well.

A worm is a program that makes and facilitates the distribution of copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive via exploitation of a system vulnerability or by clicking on an infected e-mail.

A Trojan Horse portrays itself as something other than what it is at the point of execution. While it may advertise its activity after launching, this information is not apparent to the user beforehand. A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of the computer. A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. The malicious functionality of a Trojan Horse may be anything undesirable for a computer user, including data destruction or compromising a system by providing a means for another computer to gain access, thus bypassing normal access controls.

A (universal) vulnerability is a state in a computing system (or set of systems) which either:

* Allows an attacker to execute commands as another user
* Allows an attacker to access data that is contrary to the specified access restrictions for that data
* Allows an attacker to pose as another entity
* Allows an attacker to conduct a denial of service

A symbol that enables multiple matching values to be returned based on a shared feature. The script language has two wildcards:

1. The question mark (?) stands for any single character.

2. The asterisk (*) stands for any character string of any length.

For example, the file specification *.* would return all the files, regardless of their file names.

The file specification *.sc? would return all the file names with a three-character extension beginning with sc (such as compusrv.scr, compusrv.scx, and so on).

Sorry have to put this in bold: (Important)

1. A person who enjoys learning the details of programming systems and how to stretch their capabilities, as opposed to most users who prefer to learn only the minimum necessary.
2. One who programs enthusiastically, or who enjoys programming rather than just theorizing about programming.
3. A person capable of appreciating hack value (q.v.).
4. A person who is good at programming quickly. Not everything a hacker produces is a hack.
5. An expert at a particular program, or one who frequently does work using it or on it.

A programmer who "cracks'' (gains unauthorized access to) computers, typically to do malicious things; "crackers are often mistakenly called hackers"

Hackers find Vulnerabilities in programs or in websites and exploit them to the maker of the site or program. Cracker will find Vulnerabilities and use it for their own personal use.

I hope this has helped you to understand terms more clearly. Enjoy.... :tazz:

Edited by spike_hacker_inc, 12 March 2006 - 12:25 PM.

  • 1





  • Member
  • PipPip
  • 31 posts
How they got those names..

-ABN AMRO- In the 1960s, the Nederlandse Handelmaatschappij (Dutch Trading Society 1824) and the Twentsche Bank merged to form the Algemene Bank Nederland ( ABN General Bank of the Netherlands). In 1966, the Amsterdamsche Bank and the Rotterdamsche Bank merged to form the Amro Bank. In 1991, ABNand Amro Bank merged to form ABN AMRO.

-Acccenture- Accent on the Future. Greater-than 'accent' over the logo's t points forward towards the future. The name Accenture was proposed by a company employee in Norwayas part of a internal name finding process (BrandStorming). Prior to January 1, 2001 the company was called Andersen Consulting.

-Adidas- from the name of the founder Adolf (Adi) Dassler.

-Adobe- came from name of the river Adobe Creek that ran behind the houses of founders John Warnock and Chuck Geschke .

-AltaVista- Spanish for "high view".

-Amazon.co- Founder Jeff Bezos renamed the company to Amazon (from the earlier name of Cadabra.com) after the world's most voluminous river, the Amazon. He saw the potential for a larger volume of sales in an online bookstore as opposed to the then prevalent bookstores. (Alternative: It is said that Jeff Bezos named his book store Amazon simply to cash in on the popularity of Yahoo at the time. Yahoo listed entries alphabetically, and thus Amazon would always appear above its competitors in the relevant categories it was listed in).

-AMD- Advanced Micro Devices.

-Apache- The name was chosen from respect for the Native American Indian tribe of Apache (IndĂ©), well-known for their superior skills in warfare strategy and their inexhaustible endurance. Secondarily, and more popularly (though incorrectly) accepted, it's considered a cute name that stuck: its founders got started by applying patches to code written for NCSA's httpd daemon. The result was 'a patchy' server â€" thus the name Apache.

-Apple- For the favourite fruit of co-founder Steve Jobs and/or for the time he worked at an apple orchard. He was three months late in filing a name for the business, and he threatened to call his company Apple Computer if his colleagues didn't suggest a better name by 5 p.m. Apple's Macintosh is named after a popular variety of apple sold in the US. Apple also wanted to distance itself from the cold, unapproachable, complicated imagery created by the other computer companies at the time had names like IBM, NEC, DEC, ADPAC, Cincom, Dylakor, Input, Integral Systems, SAP, PSDI, Syncsort and Tesseract. The new company sought to reverse the entrenched view of computers in order to get people to use them at home. They looked for a name that was unlike the names of traditional computer companies, a name that also supported a brand positioning strategy that was to be perceived as simple, warm, human, approachable and different. Note: Apple had to get approval from the Beatle's Apple Corps to use the name 'Apple' and paid a one-time royalty of $100,000 to McIntosh Laboratory, Inc., a maker of high-end audio equipment, to use the derivative name 'Macintosh', known now as just 'Mac'.

-AT&T- American Telephone and Telegraph Corporation officially changed its name to AT&T in the 1990s.

-Bauknecht- Founded as an electrotechnical workshop in 1919 by Gottlob Bauknecht.

-BBC- Stands for British Broadcasting Corporation.

-BenQ- Bringing ENjoyment and Quality to life.

-Blaupunkt- Blaupunkt (Blue dot) was founded in 1923 under the name Ideal. Their core business was the manufacturing of headphones. If the headphones came through quality tests, the company would give the headphones a blue dot. The headphones quickly became known as the blue dots or blaue Punkte. The quality symbol would become a trademark, and the trademark would become the company name in 1938.

-BMW- Abbreviation of Bayerische Motoren Werke (Bavarian Motor Factories).

-Borealis- The Northern Lights or Aurora Borealis, is the celestial phenomenon that features bursts of light in colourful patterns dancing across the night skies of the north. Borealis, inspired from the shining brilliance of the Northern Lights, was formed in 1994 out of the merger between two northern oil companies, Norway's Statoil and Finland's Neste.

-BP- Formerly British Petroleum, now "BP" (The slogan "Beyond Petroleum" has incorrectly been taken to refer to the company's new name following its rebranding effort in 2000).

-BRAC- Abbreviation for Bangladesh Rural Advancement Committee, world's largest NGO (non governmental organization). It works in development programs around the world.

-Bridgestone- Named after founder Shojiro Ishibashi. The surname Ishibashi (??) means "stone bridge", i.e. "bridge of stone".

-Bull- Compagnie des machines Bull was founded in Paristo exploit the patents for punched card machines taken out by a Norwegian engineer, Fredrik Rosing Bull.

-Cadillac- Cadillac was named after the 18th century French explorer Antoine Laumet de La Mothe , sieur de Cadillac, founder of Detroit, Michigan. Cadillac is a small town in the South of France.

-Canon- Originally (1933) Precision Optical Instruments Laboratory the new name (1935) derived from the name of the company's first camera, the Kwannon, in turn named after the Japanese name of the Buddhist bodhisattva of mercy.

-CGI- From the first letter of Information Management Consultant in french (Conseiller en Gestion et Informatique).

-Cisco- Short for San Francisco. It has also been suggested that it was "CIS-co" -- Computer Information Services was the department at StanfordUniversitythat the founders worked in.

-COBRA- Computadores Brasileiros, "Brazilian Computers", electronics and services company, was the first state-owned designer and producer of computers in the 1970s, later acquired by the Banco do Brasil.

-Coca-<b]Cola</b]- Coca-Cola's name is derived from the coca leaves and kola nuts used as flavoring. Coca-Cola creator John S. Pemberton changed the 'K' of kola to 'C' for the name to look better.

-Colgate-Palmolive- Formed from a merger of soap manufacturers Colgate & Company and Palmolive-Peet. Peet was dropped in 1953. Colgate was named after WilliamColgate, an English immigrant, who set up a starch, soap and candle business in New York Cityin 1806. Palmolive was named for the two oils (Palm and Olive) used in its manufacture.

-Compaq- From "comp" for computer, and "pack" to denote a small integral object; or: Compatibility And Quality; or: from the company's first product, the very compact Compaq Portable.

-Comsat- An American digital telecommunications and satellite company, founded during the President Kennedy era to develop the technology. Contraction of Communications Satellites.

-Daewoo- The company founder Kim Woo Chong called it Daewoo which means "Great Universe" in Korean.

-Dell- Named after its founder, Michael Dell. The company changed its name from Dell Computer in 2003.

-DHL- The company was founded by Adrian Dalsey, Larry Hillblom , and Robert Lynn , whose last initials form the company's moniker.

-eBay- Pierre Omidyar, who had created the Auction Web trading website, had formed a web consulting concern called Echo Bay Technology Group. " EchoBay" didn't refer to the town in Nevada, the nature area close to Lake Mead, or any real place. "It just sounded cool," Omidyar reportedly said. When he tried to register EchoBay.com, though, he found that Echo Bay Mines, a gold mining company, had gotten it first. So, Omidyar registered what (at the time) he thought was the second best name: eBay.com.

-Epson- Epson Seiko Corporation, the Japanese printer and peripheral manufacturer, was named from "Son of Electronic Printer".

-Fanta- was originally invented by Max Keith in Germanyin 1940 when World War II made it difficult to get the Coca-Cola syrup to [bleep] Germany. Fanta was originally made from byproducts of cheese and jam production. The name comes from the German word for imagination (Fantasie or Phantasie), because the inventors thought that imagination was needed to taste oranges from the strange mix.

-Fazer- Named after its founder, Karl Fazer.

-Fiat- Acronym of Fabbrica Italiana Automobili Torino (Italian Factory of Cars of Turin).

-Fuji- From the highest Japanese mountain Mount Fuji.

-Google- The name is an intentional misspelling of the word googol, reflecting the company's mission to organize the immense amount of information available online.

-Haier- Chinese ? "sea" and ? (a transliteration character; also means "you" in Literary Chinese)

-HP- Bill Hewlett and Dave Packard tossed a coin to decide whether the company they founded would be called Hewlett-Packard or Packard-Hewlett.

-Hitachi- Old place name, literally "sunrise"

-Honda- From the name of its founder, Soichiro Honda.

-Honeywell- From the name of Mark Honeywell founder of Honeywell Heating Specialty Co. It later merged with Minneapolis Heat Regulator Company and was finally called Honeywell Inc. in 1963.

-Hotmail- Founder Jack Smith got the idea of accessing e-mail via the web from a computer anywhere in the world. When Sabeer Bhatia came up with the business plan for the mail service, he tried all kinds of names ending in 'mail' and finally settled for Hotmail as it included the letters "HTML" - the markup language used to write web pages. It was initially referred to as HoTMaiL with selective upper casing. (If you click on Hotmail's 'mail' tab, you will still find "HoTMaiL" in the URL).

-HSBC- The Hongkong and Shanghai Banking Corporation.

-Hyundai- Connotes the sense of "the present age" or "modernity" in Korean.

-IBM- Named by Tom Watson, an ex-employee of National Cash Register. To one-up them in all respects, he called his company International Business Machines.

-ICL- Abbreviation for International Computers Ltd, once the UK's largest computer company, but now a service arm of Fujitsu, of Japan.

-IKON- Copier company name derived from I Know One Name.

-Intel- Bob Noyce and Gordon Moore initially incorporated their company as N M Electronics. Someone suggested Moore Noyce Electronics but it sounded too close to "more noise" -- not a good choice for an electronics company! Later, Integrated Electronics was proposed but it had been taken by somebody else. Then, using initial syllables from INTegrated ELectronics, Noyce and Moore came up with Intel. To avoid potential conflicts with other companies of similar names, Intel purchased the name rights for $15,000 from a company called Intelco. (Source: Intel 15 Years Corporate Anniversary Brochure).

-Interland- A web hosting provider formally known as Micron Computer, Inc. which was named either after InternetLandor the combination of the largest acqusition it performed, Interliant with the word Land.

-Kawasaki- From the name of its founder, Shozo Kawasaki

-Kodak- Both the Kodak camera and the name were the invention of founder George Eastman . The letter "K" was a favourite with Eastman; he felt it a strong and incisive letter. He tried out various combinations of words starting and ending with "K". He saw three advantages in the name. It had the merits of a trademark word, would not be mis-pronounced and the name did not resemble anything in the art. There is a misconception that the name was chosen because of its similarity to the sound produced by the shutter of the camera.

-Konica- It was earlier known as Konishiroku Kogaku. Konishiroku in turn is the short for Konishiya Rokubeiten which was the first name of the company established by Rokusaburo Sugiura in the 1850s.

-Korg- Formed from the surnames of the founders, Tsutomu Katoh and Tadashi Osanai, combined with the letters "rg" from the word organ.

-LG- Combination of two popular Korean brands Lucky and Goldstar. (In Mexicopublicists explained the name change to the public as an abbreviation to LĂnea Goldstar Spanish for Goldstar Line).

-L'Oréal- In 1907, Eugène Schueller, a young French chemist, developed an innovative hair-color formula. He called his improved hair dye Auréole.

-Lotus Software- Mitch Kapor got the name for his company from 'The Lotus Position' or 'Padmasana'. Kapor used to be a teacher of Transcendental Meditation technique as taught by Maharishi Mahesh Yogi.

-Lucent Technologies- a spin-off from AT&T, it was named Lucent (meaning "luminous" or "glowing with light") because "light as a metaphor for visionary thinking reflected the company's operating and guiding business philosophy," according to the Landor Associates staff who chose the name. Source: Design Management Journal 8:1 (Winter 1997).

-Lycos- From Lycosidae, the family of wolf spiders.

-Mazda Motor- From the company's first president, Jujiro Matsuda . In Japanese, no syllables are ever stressed and some inner syllables are virtually skipped. Thus, Matsuda is pronounced "Matsda". To make the name fly better outside of Japan, the spelling was changed to Mazda.

-McDonald's- From the name of the brothers Dick McDonald and Mac McDonald, who founded the first McDonald 's restaurant in 1940.

-Mercedes- This is the first name of the daughter of Emil Jellinek, who worked for the early Daimler
company around 1900.

-MGM- Metro-Goldwyn-Mayer was formed by the merger of three picture houses Metro Picture Corporation, Goldwyn Pictures Corporation and Louis B. Mayer Pictures. Goldwyn Picture Corporation in turn was named after the last names of Samuel Goldfish and Edgar and Archibald Selwyn.

-Micron- Computer memory producer named after the microscopic parts of its products. The official name was Micron Computer, Inc. Since, the company has become Interland, a web hosting provider, after selling/spinning off its RAM division and closing down its computer division, licensing the name. The company is now headquartered in Atlanta.

-Microsoft- Coined by Bill Gates to represent the company that was devoted to MICROcomputer SOFTware. Originally christened Micro-Soft, the '-' was removed later on.

-midPhase- The post-dotcom era gave using the .com in a companies official name untrendy. A new dotcom company may be named traditionally, in midPhase's case it was named midPhase Services, Inc., the midPhase stands for Middle Phase, or middle of the road.

-Mitsubishi- The name Mitsubishi (??) has two parts: mitsu means three and hishi (changing to bishi in the middle of the word) means water chestnut, and from here rhombus, which is reflected in the company's logo.

-Motorola- Founder Paul Galvin came up with this name when his company (at the time, Galvin Manufacturing Company) started manufacturing radios for cars. Many audio equipment makers of the era used the " ola" ending for their products, most famously the "Victrola" phonograph made by the Victor Talking Machine Company. The name was meant to convey the idea of "sound" and "motion". The name became so recognized that the company later adopted it as the company name.

-Mozilla Foundation- From the name of the web-browser that preceded Netscape Navigator. When Marc Andreesen , founder of Netscape, created a browser to replace the Mosaic browser, it was internally named Mozilla (Mosaic-Killer, Godzilla) by Jamie Zawinski.

-MRF- Madras Rubber Factory, founded by K M Mammen Mappillai in 1946. He started with a toy balloon-manufacturing unit at Tiruvottiyur, Chennai (then called Madras). In 1952, he began manufacturing tread-rubber, and in 1961, tyres.

-Nero- Nero Burning ROM named after Nero burning Rome.

-Netscape- Named by first marketing employee Greg Sands, in a panic when the Universityof Illinoisthreatened to sue the new company for its original name, Mosaic. Netscape then paid Landor $50,000 to design a logo.

-Nike- Named for the Greek goddess of victory.

-Nikon- The original name was Nippon Kogaku, meaning "Japanese Optical".

-Nissan- The company was earlier known by the name Nippon Sangyo which means "Japanese industry".

-Nokia- Started as a wood-pulp mill, the company expanded into producing rubber products in the Finnish city of Nokia. The company later adopted the city's name.

-Nortel- The Nortel Networks name came from Nortel (Northern Telecom) and Bay Networks. The company was originally spun off from the Bell Telephone Company of Canada Ltd in 1895 as Northern Electric and Manufacturing, and traded as Northern Electric from 1914 to 1976.

-Novartis- After the Latin _expression "novae artes" which means something like "new skills".

-Oracle- Larry Ellison, Ed Oates and Bob Miner were working on a consulting project for the CIA (Central Intelligence Agency). The code name for the project was Oracle (the CIA saw this as the system to give answers to all questions or some such). The project was designed to help use the newly written SQL database language from IBM. The project eventually was terminated but they decided to finish what they started and bring it to the world. They kept the name Oracle and created the RDBMS engine. Later they changed the name of the company, Relational Technology Inc, to the name of the product.

-Pepsi- Pepsi derives its name from (treatment of) dyspepsia, an intestinal ailment.

-Philips- Royal Philips Electronics was founded in 1891, by brothers Gerard (the engineer) and Anton (the entrepreneur) Philips .

-Qantas- From its original name, Queensland And Northern Territory Aerial Services.

-Red Hat- Company founder Marc Ewing was given the Cornell lacrosse team cap (with red and white stripes) while at college by his grandfather. People would turn to him to solve their problems, and he was referred to as 'that guy in the red hat'. He lost the cap and had to search for it desperately. The manual of the beta version of Red Hat Linux had an appeal to readers to return his Red Hat if found by anyone.

-Reebok- Another spelling of rhebok (Pelea capreolus), an African antelope.

-SAAB- Founded in 1937 in Swedenas "Svenska Aeroplan aktiebolaget" (Swedish Aeroplane Company) abbreviated SAAB.

-Samsonite- Samsonite was launched as a brand in 1941, receiving its name from the Biblical character Samson, renowned for his strength.

-Samsung- Meaning three stars in Korean.

-Sanyo- The Japanese translation is disputed, although the Chinese name is "??" (literally, "Three Oceans").

-SAP- "Systems, Applications, Products in Data Processing", formerly "SystemAnalyse und Programmentwicklung" (German for "System analysis and program development"), formed by 4 ex- IBM
employees who used to work in the 'Systems/Applications/Projects' group of IBM.

-SEGA- "Service Games of Japan" (SeGa) Founded by Marty Bromley (an American) to import pinball games to Japanfor use on American military bases.

-Sharp- Japanese consumer electronics company named from its first product, an ever-sharp pencil.

-Shell- Royal Dutch Shell was established in 1907, when the Royal Netherlands Petrol Society Plc. and the Shell Transport and Trading Company Ltd. merged. The Shell Transport and Trading Company Ltd. had been established at the end of the 19th century, by commercial firm Samuel & Co (founded in 1830). Samuel & Co were already successfully importing Japanese shells when they set up an oil company, so the oil company was named after the shells Samuel & Co were importing.

-Siemens- founded in 1847 by Werner von Siemens and Johann Georg Halske: the company was originally called Telegraphen-Bau-Anstalt von Siemens & Halske.

-Sprint- From its parent company, Southern Pacific Railroad INTernal Communications. Back in the day, pipelines and railroad tracks were the cheapest place to lay communications lines, as the right-of-way was already leased or owned.

-Sun Microsystems- Its founders designed their first workstation in their dorm at StanfordUniversity, and chose the name Stanford University Network for their product, hoping to sell it to the college. They didn't.

-Suzuki- From the name of its founder, Michio Suzuki.

-Tesco- Founder Jack Cohen, who from 1919 sold groceries in the markets of the London East End, acquired a large shipment of tea from T. E. Stockwell and made new labels by using the first three letters of the supplier's name and the first two letters of his surname forming the word "TESCO".

-Toshiba- Was founded by the merger of consumer goods company Tokyo Denki (Tokyo Electric Co) and electrical firm Shibaura Seisaku-sho (Shibaura Engineering Works).

-Toyota- From the founder's name Sakichi Toyoda. Initially called Toyeda, it was changed after a contest for a better-sounding name. The new name was written in katakana with eight strokes, a number that is considered lucky in Japan.

-Unisys- Made-up name for the company that resulted from the combination of two old mainframe computer companies, Burroughs and Sperry [Sperry Univac/Sperry Rand]. It "united" two incompatible ranges. Unisys was briefly the world's second-largest computer company, after IBM.

-Verizon- A portmanteau of veritas (Latin for truth) and horizon.

-Vodafone- Is a multinational mobile phone operator with headquarters in the United Kingdom. Its name is made up of VOice, DAta, TeleFONE. Vodafone made the UK's first mobile call at a few minutes past midnight on the 1 January 1985.

-Volvo- From the Latin word "volvo", which means "I roll". It was originally a name for a ball bearing being developed by SKF.

-Xerox- The inventor, Chestor Carlson, named his product trying to say `dry' (as it was dry copying, markedly different from the then prevailing wet copying). The Greek root `xer' means dry.

-Yahoo!- A "backronym" for Yet Another Hierarchical Officious Oracle. The word Yahoo was invented by Jonathan Swift and used in his book Gulliver's Travels. It represents a person who is repulsive in appearance action and is barely human. Yahoo! founders David Filo and Jerry Yang selected the name because they jokingly considered themselves yahoos.

Now you know.. :tazz:

Edited by Optikal, 17 March 2006 - 07:39 PM.

  • 1




  • Member
  • PipPip
  • 11 posts

Very nice and thoughtful to research and compile the above terms for our perusal. To this day, I still find myself looking up various computer-related terms so to stay on a cutting edge (if possible) in the industry. This collection of defs is great for younger users and those just getting started with computers\ programming. School leaves out SO much-- you gotta learn on your own, to to get anywhere in this field.

Very good post. Thanks.
  • 0




  • Member
  • PipPipPip
  • 501 posts
Exelent! A very good thread! You can not find this anywhere on the web. Very valuable post.

Good job!
  • 0



    New Member

  • Member
  • Pip
  • 1 posts
Very useful. Thanks for sharing!
  • 0




  • Member
  • PipPip
  • 20 posts
Awesome, very informative... thanks for sharing dude.
  • 0




  • Member
  • PipPipPip
  • 305 posts
still an interesting compilation of information, thanks
  • 0

dora villa

dora villa

    New Member

  • Member
  • Pip
  • 2 posts
Very useful to me ( a beginner)
  • 0




  • Member
  • PipPip
  • 10 posts

very useful ty

  • 0



    Miss Congeniality

  • GeekU Moderator
  • 8,529 posts
No one is stupid and the poor people of the world are more intelligent than they realize. If I knew what kind of help you needed I would try my best to help. Please explain what you want help with. :)
  • 0

Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP