|The downside to the Towers of Hanoi tape rotation scheme is its complexity and the fact that not all backup applications support it. This method also has a tendency to wear out lower numbered tapes because they are used so much more frequently than higher numbered tapes.
Brien M. Posey, An introduction to data backup tape rotation schemes
Today’s WhatIs.com Word of the Day definition is Tower of Hanoi.
|“Onboarding is one of those made-up words that creeps into the English language to drive us purists crazy. I suspect their authors cheat at Scrabble, adding ‘ing’ to words such as network, partner and dialogue to get extra points.”
Jim George, Onboarding, offboarding and just plain B.S.
Today’s WhatIs.com Word of the Day is onboarding.
|“Most of the larger financial institutions have some kind of pandemic/influenza plan or at least a pandemic overlay to their existing business continuity plans, but I don’t know if I would say they’re all prepared to the extent that they need to be prepared.”
John Copenhaver as quoted in Swine flu puts spotlight on pandemic planning
Today’s WhatIs.com Word of the Day is pandemic planning.
|The feed mechanism plays an important role in the design of microstrip patch antennas. A microstrip patch antenna can be fed either by coaxial probe or by an inset microstrip line. Coaxial probe feeding is sometimes advantageous for applications like active antennas, while microstrip line feeding is suitable for developing high-gain microstrip array antennas.
M. Ramesh and K.B. Yip, Design Inset-Fed Microstrip Patch Antennas
Today’s WhatIs.com Word of the Day is patch antenna.
|As soon as you start using private addresses and PAT in your network, you lose one of the important security features: accountability. If a rogue user of your network is attacking an outside server, it’s close to impossible to identify him…Apache, the most popular open-source Web server, does not log port numbers.
Ivan Pepelnjak, Avoiding private IP security risks in public networks
Today’s WhatIs.com Word of the Day is Port Address Translation.
|Compliance with the Red Flag rules must take a risk-based approach. Organizations are not given a specific set of items to implement; there is no detailed checklist. Compliance is principle-based focused on the outcome — avoiding identity theft — and not on specific requirements.
Michael Rasmussen, Red Flag Rules compliance demands a risk-based approach
Today’s WhatIs.com Word of the Day is Red Flags Rule.
|Sending spam, or hiring someone to send it for you, is illegal in many countries, including the U.S., where it violates the CAN-SPAM Act of 2003. Using false or misleading header information is also a violation of the CAN-SPAM Act, but since the spammer has already decided to break the law by sending the spam in the first place, adding the crime of email address forging is trivial.
Michael Cobb, Why is backscatter spam so difficult to block?
Today’s WhatIs.com Word of the Day is backscatter spam.
|URL spoofing substitutes an outlaw Web address for a legitimate one. A simple way to do that is to exploit the state of spelling among English-speaking people. A site like eddiebaur .com might fool the eye of a casual Web surfer looking for outdoor gear from Eddie Bauer.
John P Mello, ICANN move contributing to URL spoofing?
Today’s WhatIs.com Word of the Day is the Vouch by Reference protocol.
|Compliance is a hamster wheel of pain. Are we in compliance? -> Hire Consultant -> The Consultant Says No -> Scurry and spend -> Repeat.
Alex Hutton, The Cult Of Compliance
Today’s WhatIs.com Word of the Day is enterprise document management.
|“Because the closed-loop assesses capacity at every level, it shortens the timeframe in which any shortfalls may be detected and rectified.”
Pat Kennedy, Vivek Bapat, Paul Kurchina, Manufacturing plant information management
Today’s WhatIs.com Word of the Day is closed loop MRP.