|“The Blue Gene supercomputers are an outstanding example of our investment in nuclear security providing the tools to tackle broader national challenges. This machine, which was originally developed to ensure the safety and reliability of our nuclear stockpile without testing, has led to amazing advances in science and discovery.”
NNSA Administrator Thomas D’Agostino, Blue Gene Named Medal of Technology and Innovation Award Winner
Today’s WhatIs.com Word of the Day is Blue Gene.
President Obama recognized IBM and its Blue Gene family of supercomputers with the National Medal of Technology and Innovation, the country’s most prestigious award given to leading innovators for technological achievement…
…Blue Gene systems have helped map the human genome, investigated medical therapies, safeguarded nuclear arsenals, simulated radioactive decay, replicated brain power, flown airplanes, pinpointed tumors, predicted climate trends, and identified fossil fuels – all without the time and money that would have been required to physically complete these tasks.
|“Stop saying cloud, because that doesn’t help. Talk about what you really want. From there, the security needs can be work out.”
Archie Reed, RSA: Cutting Through the Cloud Security Talk
I love this man. He is soooooo right.
|“The attacks to steal credit cards are significant, but the real threat is to intellectual property.”
David Burg, Companies urged to share data breach information
Today’s WhatIs.com Word of the Day is data breach.
|“There is no greater advantage to a LEED school than using it as a teaching tool for our next generation.”|
Today’s WhatIs.com Word of the Day is LEED (Leadership in Energy and Environmental Design). It’s a certification for green buildings.
Dr. Ujjval K. Vyas says:
Owners’ prime interest in sustainable design remains economically driven, since many LEED projects show clear life-cycle cost advantages and will often help smooth the way for community approval. Contractors, on the other hand, are interested in responding to the changing marketplace (this is especially the case for contractors involved in the public sector) and seek to obtain first-in-time status to acquire a competitive edge.
It seems like every datacenter architect has the letters LEED AP after their names. I get the LEED part, but I can’t seem to find out what the letters “A” and “P” stand for. Approved Person?
I’m also interested in finding out why LEED certification is such a hot topic. Are there tax advantages? Is it just for PR? I can understand why a building owner would want to upgrade his heating/electrical etc. to save money by improving efficiency, but why would go after the LEED certification when you’re retrofitting an older building? Are bragging rights worth the hassle of getting certified?
|Accidents have caused just as much damage as ‘cyberwarfare’ or other intentional attacks. ‘War’ is not the problem; mismanagement, disorganization and fear are the real threat.
Sherri Davidoff, Cyberwarfare and the enterprise: Is the threat real?
Today’s WhatIs.com Word of the Day is cyber warfare.
|“Bloom produces a new fuel-cell technology that feeds off natural gas and can be used as an alternative to getting power off the electric grid. The machines, which Bloom calls “energy servers,” cost up to $800,000 and provide 100 kilowatts of electricity. Some major companies — Google, eBay, Bank of America, WalMart — already have them installed.”
Mark Fontecchio, Google using Bloom box to power data center
According to Eric Shonfeld over at TechCrunch
Each fuel cell, which is made from sand essentially (zirconium oxide), is a square wafer about the size of a CD box. Each wafer can produce about 25 watts of energy, enough to power a lightbulb. Stack them together and you get a box that could power a house. Group them into larger units, and you get enough energy to power a building or an entire campus. He calls them energy servers because they are modular like servers in a data center. Need more energy? Add more boxes.
Today’s WhatIs.com Word of the Day is fuel cell.
The same-origin policy restricts which network messages one origin can send to another. For example, the same-origin policy allows inter-origin HTTP requests with GET and POST methods but denies inter-origin PUT and DELETE requests. Additionally, origins can use custom HTTP headers when sending requests to themselves but cannot use custom headers when sending requests to other origins.W3C Same Origin Policy
Today’s WhatIs.com Word of the Day is same origin policy.
|As with any business-to-business supply chain, if you administer electronic data interchange without standards, it doesn’t work.
Ted Kremer, as quoted in Lack of health information exchange standards slowing adoption
Today’s WhatIs.com Word of the Day is e-prescribing incentive program.
|“If you look at computing services as a car, cloud computing is like the rental car you pick up at the airport – it’s not a good option for long-term use. Managed hosting [collocation] is more like a car you lease long-term. You know what you’re getting and how much it will cost.”
Antonio Piraino, Cloud computing versus colocation: What’s the right fit?
Today’s WhatIs.com Word of the Day is collocation.
|“Odds are your PC came with a recovery disc, a CD with all the programs and drivers that were installed on its hard drive when it was new. The odds are also that you have absolutely no idea where that disc is.”
David A. Karp, Build an XP-SP2 Recovery Disc
Today’s WhatIs.com Word of the Day is motherboard tattoo.
If you bought your PC at BestBuy, you’ll want to read what David has to say about getting a full install of Windows — who knew???
The first ingredient, the Windows XP CD, may prove the most troublesome, simply because many manufacturers omit it in lieu of some sort of customized “express install” recovery disc. If Windows came preinstalled on your PC but the manufacturer didn’t provide a full Windows XP CD, contact the company and ask for one (you did pay for it, after all). In most cases, you’ll get one for free, no questions asked.