The same-origin policy restricts which network messages one origin can send to another. For example, the same-origin policy allows inter-origin HTTP requests with GET and POST methods but denies inter-origin PUT and DELETE requests. Additionally, origins can use custom HTTP headers when sending requests to themselves but cannot use custom headers when sending requests to other origins.W3C Same Origin Policy
Today’s WhatIs.com Word of the Day is same origin policy.
|As with any business-to-business supply chain, if you administer electronic data interchange without standards, it doesn’t work.
Ted Kremer, as quoted in Lack of health information exchange standards slowing adoption
Today’s WhatIs.com Word of the Day is e-prescribing incentive program.
|“If you look at computing services as a car, cloud computing is like the rental car you pick up at the airport – it’s not a good option for long-term use. Managed hosting [collocation] is more like a car you lease long-term. You know what you’re getting and how much it will cost.”
Antonio Piraino, Cloud computing versus colocation: What’s the right fit?
Today’s WhatIs.com Word of the Day is collocation.
|“Odds are your PC came with a recovery disc, a CD with all the programs and drivers that were installed on its hard drive when it was new. The odds are also that you have absolutely no idea where that disc is.”
David A. Karp, Build an XP-SP2 Recovery Disc
Today’s WhatIs.com Word of the Day is motherboard tattoo.
If you bought your PC at BestBuy, you’ll want to read what David has to say about getting a full install of Windows — who knew???
The first ingredient, the Windows XP CD, may prove the most troublesome, simply because many manufacturers omit it in lieu of some sort of customized “express install” recovery disc. If Windows came preinstalled on your PC but the manufacturer didn’t provide a full Windows XP CD, contact the company and ask for one (you did pay for it, after all). In most cases, you’ll get one for free, no questions asked.
“It really boils down to this: Employees know a lot of stuff. Social computing systems make it easy for everyone else to share and ultimately benefit from that knowledge.”Paul Galvin, A case for social computing in the enterprise
Today’s WhatIs.com Word of the Day is social computing.
Like many new technology-driven concepts, social computing can be a little confusing as a term. Definitions run the gamut, but many people will agree that social computing is both a process and supporting tool set that enable individuals within an enterprise to contribute their knowledge and insight about the business. Social computing makes business knowledge easily searchable and accessible to everyone in the enterprise at any time through a number of search avenues.
|“While companies can’t hike your rates on existing balances unless you’re 60 days late with a payment, they can raise rates on future purchases any time and for any (or no) reason. They do have to tell you this, but they’ll probably send it in an envelope that looks like junk mail in the hopes you’ll throw it out.”
Lauren Bowne, as quoted in Beware: Loopholes in the Credit CARD Act you need to know about
Today’s WhatIs.com Word of the Day is Credit CARD Act.
Martha White provides a great overview of the Credit CARD Act’s “gotchas” in her interview with Lauren Bowne.
While the CARD Act has limits on the severity of penalty fees you can be charged, there’s no rule against card companies making up as many new fees as they can conjure and charging whatever they like for them.
|IT security typically has been deemed one of those services best provided in-house. But the stigma attached to outsourcing security and Security as a Service — namely that an outsider does not know your company well enough to protect it — may be falling away, as businesses look for more ways to cut costs.|
Today’s WhatIs.com Word of the Day is Security as a Service.
A word about definitions: Like most IT monikers, Security as a Service takes various shapes.
It can refer to a traditional managed services model, in which a company hires an outside provider to configure, manage and even maintain its security infrastructure. These services can be dispatched remotely using a connection over the Internet.
Another model, “in-the-cloud” services, allows a company to use security technologies that are not located on its premises. One such cloud service that has gained traction is email security: Companies point their email to a cloud-based provider for cleansing before it’s delivered to the on-premise mail server.
Web security is also catching on, as cloud-based providers have resolved latency issues.
A third model, Security as a Utility, usually refers to an arrangement in which companies pay a monthly fee to lease security hardware for their premises and pay for the services to manage and maintain it.
|“Historically, if you were the network administrator, the network was yours. You controlled everything. The network was your domain. In this new world, you may have to become an ‘influencer,’ which means you’re going to have to be able to advise your organization about what’s good and what’s bad to put in the cloud … and a lot of network administrators are short on those soft skills.”
James Staten, as quoted in IT job security fears over cloud computing? Network jobs still vital
|Smaller teams seem to gravitate towards short sprints, around two to three weeks. Planning’s are pretty simple and quick. The short sprint allows for the team to turn around things really quickly, and I personally like it a lot as product owner.
Brian Hartsock, Scrum Tip: Sprint length is a variable
Today’s WhatIs.com Word of the Day is Scrum sprint.
|The Number Resource Organization (NRO) announced that less than 10% of the remaining IPv4 addresses are unallocated, and that puts IPv4 on the endangered species list. What’s NRO? The group that officially represents the five Regional Internet Registries that oversee Internet number resources.Kate Gerwig, Move away from IPv4…This is not a test|
Today’s WhatIs.com Word of the Day is Regional Internet Registry (RIR).