SlideShare ist ein Scribd-Unternehmen logo
Baby names with a tech twist
Have a serious love of technology, and
what to share that love with the world
through the naming of your child?

We’ve got five actual names that tech-
loving parents have chosen for their
offspring, and a few more subtle
suggestions.

But remember, technology changes
fast. Make sure baby Phonograph will
stand the test of time…
                                         Image courtesy of photostock at FreeDigitalPhotos.net

             By Jeff Jedras
Apple
In 2004, actress Gwyneth Paltrow and
Coldplay frontman Chris Martin
named their daughter Apple.

Now, it’s possible she was named for
the fruit, and not the technology
company and her favourite MP3
player.

But when they later had a son, he was
                                        Image courtesy of m_bartosch at FreeDigitalPhotos.net
named Moses, which does seem like
an obvious Steve Jobs reference, no?
Facebook
The protests last January in
Egypt, centred in Tahrir Square, that
led to the downfall of president Hosni
Mubarak have been dubbed the social
media revolution. Social networks
were used to organize protests, share
information and videos, and thwart
government censorship.

Twitter played a role, but an Egyptian
man, Jamal Ibrahim, decided to name
his daughter Facebook to honour its
role. Hopefully she’ll have lots of likes.
Like



Speaking of likes, Israeli couple Lior and Vardit Adler choose a name for
their daughter that was less on the nose, but still Facebook inspired: they
named her Like.

Papa told an Israeli newspaper they wanted something unique, and they
see Like as the modern equivalent of Love.

Now where’s that dislike button, Zuckerberg?
Hashtag
We can’t let Facebook have all the baby-
name fun. The Daily Dot reports Twitter has
made its first foray into the name
game, with one tweet-happy couple
choosing to name their daughter Hashtag.

In an amusing note though, they apparently
posted the news on Facebook instead of
tweeting it. To quote the late Jack
Layton, that’s a hashtag fail.

And so is that name.
Hal
Hal has actually been a common name for
some time, and is often used as a short-
form for Henry or Harry.

So it’s possible actor Hank Azaria (also
known as the voice of many popular
Simpsons characters) wasn’t naming his
son for the HAL 9000 super computer from
2001: A Space Odyssey. We’d like to think
he did though.

Let’s wait and see if he names is next son
Dave.
More subtle choices
If you want to show your love of technology
through your child’s name but don’t want to set
them up for a lifetime of ridicule you may want
to go with a more subtle tech-inspired name.

You could name your daughter Perl, for the
programming language. After all, Pearl was
once a common (if old-fashioned) name choice.

Show your love of Linux by naming your child
Linus, for Linus Torvalds (or, if anyone asks, the
Charlie Brown character).
                                                     Image courtesy of sixninepixelsat FreeDigitalPhotos.net


Pascal is another option. Just drop the Turbo.

Weitere ähnliche Inhalte

Was ist angesagt?

My Podcast Problem
My Podcast Problem My Podcast Problem
My Podcast Problem
TheFrankenPod
 
Deadpool: A Lesson in Atypical Advertising
Deadpool: A Lesson in Atypical AdvertisingDeadpool: A Lesson in Atypical Advertising
Deadpool: A Lesson in Atypical Advertising
scottie10014
 
Teaser Posters vs Theatrical Posters - A2 Media
Teaser Posters vs Theatrical Posters - A2 Media Teaser Posters vs Theatrical Posters - A2 Media
Teaser Posters vs Theatrical Posters - A2 Media
Fabio Chiarizia
 
Research catalogue
Research catalogueResearch catalogue
Research catalogue
Benjamin Withers
 
Harry Potter
Harry PotterHarry Potter
Harry PotterEmahaffey
 
Brief - Task 1 and 2
Brief - Task 1 and 2Brief - Task 1 and 2
Brief - Task 1 and 2
ilyaboj
 

Was ist angesagt? (8)

My Podcast Problem
My Podcast Problem My Podcast Problem
My Podcast Problem
 
Title ideas
Title ideas Title ideas
Title ideas
 
Deadpool: A Lesson in Atypical Advertising
Deadpool: A Lesson in Atypical AdvertisingDeadpool: A Lesson in Atypical Advertising
Deadpool: A Lesson in Atypical Advertising
 
Teaser Posters vs Theatrical Posters - A2 Media
Teaser Posters vs Theatrical Posters - A2 Media Teaser Posters vs Theatrical Posters - A2 Media
Teaser Posters vs Theatrical Posters - A2 Media
 
Research catalogue
Research catalogueResearch catalogue
Research catalogue
 
Harry Potter
Harry PotterHarry Potter
Harry Potter
 
Brief - Task 1 and 2
Brief - Task 1 and 2Brief - Task 1 and 2
Brief - Task 1 and 2
 
Institution
InstitutionInstitution
Institution
 

Mehr von JeffJedras

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
JeffJedras
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
JeffJedras
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
JeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
JeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
JeffJedras
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
JeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
JeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
JeffJedras
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
JeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
JeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
JeffJedras
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
JeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
JeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
JeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
JeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
JeffJedras
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
JeffJedras
 

Mehr von JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 

Kürzlich hochgeladen

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 

Kürzlich hochgeladen (20)

Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 

Baby names with a tech twist

  • 1. Baby names with a tech twist Have a serious love of technology, and what to share that love with the world through the naming of your child? We’ve got five actual names that tech- loving parents have chosen for their offspring, and a few more subtle suggestions. But remember, technology changes fast. Make sure baby Phonograph will stand the test of time… Image courtesy of photostock at FreeDigitalPhotos.net By Jeff Jedras
  • 2. Apple In 2004, actress Gwyneth Paltrow and Coldplay frontman Chris Martin named their daughter Apple. Now, it’s possible she was named for the fruit, and not the technology company and her favourite MP3 player. But when they later had a son, he was Image courtesy of m_bartosch at FreeDigitalPhotos.net named Moses, which does seem like an obvious Steve Jobs reference, no?
  • 3. Facebook The protests last January in Egypt, centred in Tahrir Square, that led to the downfall of president Hosni Mubarak have been dubbed the social media revolution. Social networks were used to organize protests, share information and videos, and thwart government censorship. Twitter played a role, but an Egyptian man, Jamal Ibrahim, decided to name his daughter Facebook to honour its role. Hopefully she’ll have lots of likes.
  • 4. Like Speaking of likes, Israeli couple Lior and Vardit Adler choose a name for their daughter that was less on the nose, but still Facebook inspired: they named her Like. Papa told an Israeli newspaper they wanted something unique, and they see Like as the modern equivalent of Love. Now where’s that dislike button, Zuckerberg?
  • 5. Hashtag We can’t let Facebook have all the baby- name fun. The Daily Dot reports Twitter has made its first foray into the name game, with one tweet-happy couple choosing to name their daughter Hashtag. In an amusing note though, they apparently posted the news on Facebook instead of tweeting it. To quote the late Jack Layton, that’s a hashtag fail. And so is that name.
  • 6. Hal Hal has actually been a common name for some time, and is often used as a short- form for Henry or Harry. So it’s possible actor Hank Azaria (also known as the voice of many popular Simpsons characters) wasn’t naming his son for the HAL 9000 super computer from 2001: A Space Odyssey. We’d like to think he did though. Let’s wait and see if he names is next son Dave.
  • 7. More subtle choices If you want to show your love of technology through your child’s name but don’t want to set them up for a lifetime of ridicule you may want to go with a more subtle tech-inspired name. You could name your daughter Perl, for the programming language. After all, Pearl was once a common (if old-fashioned) name choice. Show your love of Linux by naming your child Linus, for Linus Torvalds (or, if anyone asks, the Charlie Brown character). Image courtesy of sixninepixelsat FreeDigitalPhotos.net Pascal is another option. Just drop the Turbo.