See also: Engineering | Progress | Function Creep
To change or alter a design, often aiming to make a slight improvement. Modification can be done with innovation, engineering or by changing a feature or function.
Conversion Tools are used to modify files. The Software Cycle is a model for improving programming with modifications or edits to code. A merciless refactor refers to a major overhaul of something.
Activism usually seeks to modify a particularly thing. For example a political protest or a boycott aims to alter policy.
Rules, etiquette, law, protocols, standards and culture can all undergo modification. Modifications to systems can be complex and chaotic.
In computers, these can be classified into levels:
- Default settings – No changes, used as “out of the box.” This is often the baseline for programs and, in technical support, many users are asked to restore the default settings.
- Examples:
-
- Purchasing a computer and uses only the included software.
- Simple programs such as BitTorrent, which do not have any modifyable settings
- Configure – To change the parameters of a program, either personalizing or setting up integration. All options would be changed within the menus of a program, for instance clicking on the “Options” menu and opening “Settings.”
- Examples:
- Tweak – not officially endorsed/supported, nothing extreme just fine tuning and optimization.
- Examples:
-
- Changing the Windows registry file to turn off “Quality of Service” packets on all network connections.
- Overclocking a machine to run faster and installing a new fan to compensate for the increased heat level.
- Fleshing Out
- Resolving compatibility issues
- Hack – to drastically change a system or program’s settings to run different or better. Often, this type of activity can void one’s warranty. Calling the product’s technical support for assistance is probably not useful or impossible. This is usually done at a highly technical or source code level.
- Examples:
-
- Soldering a motherboard to disable anti-overclocking mechanisms.
- Develop a new program to update and registry changes made system-wide.
- Circumventing Port-Blocking or Firewall that restricts a program’s use.
- Finding weaknesses in a security program.
- Improving Open-Source software
- Developing a port to another OS
- Reverse-Engineer – to determine how a program works, despite restrictions, disable those restrictions, and possibly recreate the program entirely. This can be time-consuming and highly technical.
-
- Disassembling software or hardware and recreating it to run compatible with the previous software or hardware
- Developers who determined how to get OpenOffice to open the proprietary Microsoft Word document file format.
- Writing software Cracks
Related
TakeDown.NET -> “Modify”