Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Correct History of Autocorrect

b2ap3_thumbnail_this_is_autocorrect_400.jpgAutocorrect. The world takes it for granted now, but at times, it can be as furious as it is fasting… err, fascinating. It plays such an integral part of our everyday lives, yet how much do you really know about this software?

For example, how many of you actually know how autocorrect came into existence? We bet even less of you know how autocorrect chooses the correct spelling and grammar for each word and phrase out there. Autocorrect was born from a feature that had already existed in Word, which was a glossary of sorts that acted as an auto-expander. With this, you were able to expand existing text with other things, such as a replacer for a company logo.

This method utilized script in the programming, but the pioneer of autocorrect, Dean Hachamovitch (former corporate vice president of Microsoft), realized that the glossary could be used in many more applications. The first word targeted by autocorrect was destined to be teh, a commonly seen word amongst Internet memes and illiterate people worldwide. Hachamovitch crafted a script which would fix this spelling error when you pressed the left arrow key and F3 simultaneously. Perhaps his biggest revelation was when he noticed that English is a very space-oriented language, and that he could trigger the autocorrect to happen upon hitting the spacebar.

Afterward, it was simply a matter of figuring out what the most commonly misspelled words were. Some of Total Tech Care’s favorite misspellings are as follows:

  • seperate vs separate
  • affect vs effect
  • its vs it’s
  • misspell vs mispell (nothing is more embarrassing than misspelling mispell)
  • their, they’re, and there
  • recommend vs reccommend
  • could of vs could have

Of course, whether or not a word should be fixed in autocorrect boils down to how often it’s used. Additionally, Microsoft can’t go around recommending obscenities for corrections. Obscenities are labeled as words that aren’t flagged or suggested. Other words are determined by a number of different factors:

  • Keyboard proximity
  • Phonetics
  • Sentence context

What this means is that most words are judged by how popular they are in the context of language and sentence structure. This is also known as the battle between prescriptivism and descriptivism; how words should be used and how they are used in practice. Just because a word is used often doesn’t mean that it is the proper way of using said word.

Has autocorrect made humans lazy? We at Total Tech Care don’t think so. If anything, we have to be even more careful about what is typed out, as a single error can be detrimental and embarrassing. Call Total Tech Care at 866-348-2602 and we’ll work with you to prevent IT hiccups that could be punishing.

 

Comments 1

Luke Padilla on Thursday, 11 July 2019 21:43

Such errors took place in the start of writing articles but as time passes you get along with it. I remember that in start I used to do the same even I selected auto correct to get rid of spelling mistakes but all in vain. Then I heard about https://www.aussieessay.net/ and it really helped me in getting rid of mistakes I made in my articles.

Such errors took place in the start of writing articles but as time passes you get along with it. I remember that in start I used to do the same even I selected auto correct to get rid of spelling mistakes but all in vain. Then I heard about https://www.aussieessay.net/ and it really helped me in getting rid of mistakes I made in my articles.
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Social Media Holiday Gadgets Tech Term Chrome Virtualization Managed Service Microsoft Office Managed IT Services Automation Artificial Intelligence Cybercrime Operating System Computers Facebook Mobile Device Management Networking Health Wi-Fi IT Support Hacking BYOD Internet of Things Information Alert Remote Managed Service Provider Covid-19 Spam Office 365 Telephone Systems Information Technology Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Human Resources Data Breach Password Money Big Data Remote Monitoring Encryption Applications Mobile Computing App History Law Enforcement Application VPN Managed IT Remote Computing Apps Mobile Office How To Government Office Tips Blockchain Training Data Storage Paperless Office Private Cloud Patch Management Vulnerability Gmail Windows 7 Settings Word Bring Your Own Device Data Management Infrastructure Two-factor Authentication Voice over Internet Protocol Work/Life Balance Servers Mouse HaaS Data Security Google Drive Flexibility Marketing WiFi Avoiding Downtime IT solutions Entertainment Wireless Website Budget Machine Learning Scam Save Time Connectivity Remote Work Firewall Cleaning Vendor Management Virtual Reality Vendor Apple Managed Services Display Social End of Support Education Physical Security User Error Data Protection Safety Meetings Employee/Employer Relationship Sports HIPAA Redundancy RMM Keyboard Risk Management Hacker The Internet of Things Lithium-ion battery USB Staff Software as a Service Conferencing Telephone System Solid State Drive Wireless Technology How to Business Intelligence Downtime IT Consultant Procurement Net Neutrality Customer Service Update Workplace Strategy Audit Worker Environment Help Desk IT Management Data storage Humor Printing Fax Server Google Docs Automobile Identity Theft Botnet IT Plan SaaS Computing Infrastructure Going Green Managed Services Provider Unsupported Software Augmented Reality Database Charger Network Congestion Fraud Battery Remote Workers eWaste Remote Worker Shadow IT Compliance Legal OneNote Computer Care Processor Current Events Cryptocurrency Internet Exlporer Virus Telephony Samsung Hard Drive Unified Threat Management Wearable Technology Retail Computer Accessories Comparison Hard Drives PDF Value Instant Messaging CES Robot Excel Computing Spam Blocking Proactive IT Electronic Medical Records Biometrics Best Practice Content Management Virtual Desktop Business Technology YouTube Hiring/Firing Access Control Printer Black Market Bluetooth DDoS Digital Signage Virtual Assistant Authentication SharePoint Document Management Project Management AI Nanotechnology IT Infrastructure Telecommuting Analyitcs Tools Programming FinTech Television Cortana Bing Social Network Digital Signature Files Warranty Chromecast Investment Employees Public Computer HVAC Employee/Employer Relationships Antivirus Google Apps Uninterrupted Power Supply Transportation Analysis ISP Windows 8 Regulations Windows 365 Colocation Computer Fan Administrator Video Conferencing Rootkit Devices ROI IT service Shortcuts Sales Monitor Enterprise Content Management Bitcoin MSP Personal Benefits Consultant Accountants Cryptomining Tablet Point of Sale Workers FENG Microchip Supply Chain Management Thought Leadership Domains Analytics Credit Cards Password Manager Monitoring Reputation IBM Password Management Batteries Streaming Media Digitize IaaS Tech Support Smart Technology Best Available Maintenance Multi-Factor Security Content Flash Windows 8.1 Techology Search Engine Laptop WIndows 7 Twitter Windows Server 2008 R2 Bloatware Business Mangement Software Tips Customer relationships Customers Supercomputer NIST IT Assessment Smart Tech Manufacturing Trending Tablets Audiobook Sync Email Best Practices Emails Touchpad Addiction Amazon Entrepreneur Recycling Security Cameras Computer Tips Managed IT Service Wiring OneDrive Two Factor Authentication Practices Biometric Security Shortcut Politics Virtual CIO Advertising Netflix Windows Media Player Root Cause Analysis Peripheral User Cache PowerPoint Amazon Web Services Cost Management Criminal Social Networking HBO Digital Security Cameras Knowledge Safe Mode Using Data Notifications Music GDPR Copiers Hosted Computing 5G Skype Data loss Quick Tip Managing Stress Wireless Internet Online Shopping Smartwatch Outlook Ergonomics Relocation Leadership File Sharing Running Cable Troubleshooting Camera Development Inventory OLED Cameras Specifications Memory Start Menu Video Games Screen Mirroring PCI DSS Loyalty Wire Virtual Machine Evernote Books Employee Travel Worker Commute Frequently Asked Questions 2FA Fiber Optics Windows 10s Printers Messaging Cabling Millennials Experience Mobile Scalability Cast Policy Smart Office Hypervisor Wireless Charging Emergency Science Business Owner Tip of the week Dark mode webinar Trend Micro Public Cloud Virtual Private Network SMS NarrowBand Employer Employee Relationship Default App Printer Server Workforce Professional Services Search Procedure Assessment Saving Time Cables Distributed Denial of Service Google Search Customer Relationship Management Windows Server 2008 dark theme iPhone Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code