Overheard: Word of the Day

A Whatis.com blog


November 23, 2009  6:12 PM

Overheard – Pandemic planning



Posted by: Margaret Rouse
Disaster Recovery, pandemic planning, risk management
“Most of the larger financial institutions have some kind of pandemic/influenza plan or at least a pandemic overlay to their existing business continuity plans, but I don’t know if I would say they’re all prepared to the extent that they need to be prepared.”

John Copenhaver as quoted in Swine flu puts spotlight on pandemic planning

Today’s WhatIs.com Word of the Day is pandemic planning.

November 20, 2009  1:17 PM

Overheard – Patch antenna



Posted by: Margaret Rouse
antenna, patch antenna
The feed mechanism plays an important role in the design of microstrip patch antennas. A microstrip patch antenna can be fed either by coaxial probe or by an inset microstrip line. Coaxial probe feeding is sometimes advantageous for applications like active antennas, while microstrip line feeding is suitable for developing high-gain microstrip array antennas.

M. Ramesh and K.B. Yip, Design Inset-Fed Microstrip Patch Antennas

Today’s WhatIs.com Word of the Day is patch antenna.


November 19, 2009  3:46 PM

Overheard – Port Address Translation (PAT)



Posted by: Margaret Rouse
CCNA Training, NAT, NAT overloading, PAT, Port Address Translation
As soon as you start using private addresses and PAT in your network, you lose one of the important security features: accountability.  If a rogue user of your network is attacking an outside server, it’s close to impossible to identify him…Apache, the most popular open-source Web server, does not log port numbers.

Ivan Pepelnjak, Avoiding private IP security risks in public networks

Today’s WhatIs.com Word of the Day is Port Address Translation.


November 18, 2009  2:44 PM

Overheard – FACTA Red Flags Rule



Posted by: Margaret Rouse
Compliance, identity management, identity theft, Red Flags Rule
Compliance with the Red Flag rules must take a risk-based approach. Organizations are not given a specific set of items to implement; there is no detailed checklist. Compliance is principle-based focused on the outcome — avoiding identity theft — and not on specific requirements.

Michael Rasmussen, Red Flag Rules compliance demands a risk-based approach

Today’s WhatIs.com Word of the Day is Red Flags Rule.


November 17, 2009  6:17 PM

Overheard – Backscatter spam



Posted by: Margaret Rouse
backscatter spam, Spam
Sending spam, or hiring someone to send it for you, is illegal in many countries, including the U.S., where it violates the CAN-SPAM Act of 2003. Using false or misleading header information is also a violation of the CAN-SPAM Act, but since the spammer has already decided to break the law by sending the spam in the first place, adding the crime of email address forging is trivial.

Michael Cobb, Why is backscatter spam so difficult to block?

Today’s WhatIs.com Word of the Day is backscatter spam.


November 16, 2009  8:52 PM

Overheard – Vouch by Reference protocol



Posted by: Margaret Rouse
Email, Vouch by Reference
URL spoofing substitutes an outlaw Web address for a legitimate one. A simple way to do that is to exploit the state of spelling among English-speaking people. A site like eddiebaur .com might fool the eye of a casual Web surfer looking for outdoor gear from Eddie Bauer.

John P Mello, ICANN move contributing to URL spoofing?

Today’s WhatIs.com Word of the Day is the Vouch by Reference protocol.


November 13, 2009  3:43 PM

Overheard – Enterprise document management



Posted by: Margaret Rouse
Compliance, Enterprise content management, enterprise document management
Compliance is a hamster wheel of pain. Are we in compliance? -> Hire Consultant -> The Consultant Says No -> Scurry and spend -> Repeat.

Alex Hutton, The Cult Of Compliance

Today’s WhatIs.com Word of the Day is enterprise document management.


November 12, 2009  7:18 PM

Overheard – Closed loop MRP



Posted by: Margaret Rouse
closed loop MRP, manufacturingERP, Supply Chain Management
“Because the closed-loop assesses capacity at every level, it shortens the timeframe in which any shortfalls may be detected and rectified.”

Pat Kennedy, Vivek Bapat, Paul Kurchina, Manufacturing plant information management

Today’s WhatIs.com Word of the Day is closed loop MRP.


November 11, 2009  2:59 PM

Overheard – Bank Secrecy Act



Posted by: Margaret Rouse
Bank Secrecy Act, Compliance, finanical security
FinCEN is now seeking to engage smaller to moderate size depository institutions who are working to implement the four pillars of theBank Secrecy Act regulatory regime: (1) policies, procedures and internal controls; (2) designation of a compliance officer; (3) ongoing training; and (4) independent testing.

Bryan Cave Law Firm, October 2009 Client Alerts

Today’s WhatIs.com Word of the Day is Bank Secrecy Act.


November 10, 2009  5:26 PM

Overheard – ZenServer physical block device



Posted by: Margaret Rouse
Citrix, physical block device, storage repository, virtual disk image, ZenServer
In cloud computing and virtualization, choosing between open source and commercial offerings means trading off between speed to market, features, support and development costs on the one hand and up-front licensing fees on the other. In a fast-moving market like cloud computing, many organizations will choose to jump-start their efforts by going with a commercial offering.

Sam Charrington, as quoted in Cloud computing provider chooses XenServer over Xen

Today’s WhatIs.com Word of the Day is physical block device.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: