Word of the Day: Tech Definitions from WhatIs.com

August 18, 2009  4:22 PM

Overheard – RealDVD and the power of the MPAA

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“It’s perfectly legal to rip music from a CD and upload it onto an iPod for personal use; why can’t a person do the same with their own copies of movies?”

Brennon Slattery, Why Pick on RealDVD?

It’s sad that RealDVD, with its sophisticated and lawful approach to DVD-copying, had to swallow the wrath of the MPAA. It’s also clear that the DMCA [Digital Millenium Copyright Act of 1998] needs to be updated to reflect the changes in media distribution 11 years later.

August 17, 2009  4:38 PM

Overheard – MIT license

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“…If I were to release a piece of software under the MIT License, and then give you a copy, you would be free to modify, sell, and build upon my creation so long as you leave the notice that I was the source of the original work in your adaptation. Licenses like the MIT License and Creative Commons licenses enable me to hold credit for my work while still giving my consumers some freedoms.”

Winslow Dalpe, Why Go Open Source?

Today’s WhatIs.com Word of the Day is MIT license.

August 10, 2009  7:26 PM

Overheard – Difference between CDMA and GSM

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“The two biggest differences between the CDMA and GSM standards are international compatibility and how the networks handle activating phones.”

Adama D. Brown, Brighthand FAQ: What’s the difference between CDMA and GSM?

Outside the U.S. and Canada, most GSM phones will still work, while almost all CDMA phones simply can’t be used overseas.

CDMA phones are activated remotely, by the carrier, using the phone’s serial number, known as the ESN. Since each carrier has a database of all the ESNs that are approved for its network, this lets most CDMA carriers refuse to activate phones not originally intended for their network.

GSM phones are activated differently. Each account is associated with what’s called a SIM card, or Subscriber Identity Module. This card, about the size of a fingertip and the thickness of a piece of paperboard, carries an encrypted version of all the information needed to identify your wireless account to the network. You slip it into the appropriate slot on a GSM phone (usually under the battery) and that phone is ready to use.

August 10, 2009  7:06 PM

Overheard – Deep fiber

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Pushing fiber close to the customer is generically called “deep fiber,” and various acronyms are used to indicate just how deep the fiber is. FTTH means “fiber to the home,” which is the extreme of giving every user an optical-electrical termination. FTTC takes “fiber to the curb,” serving a group of homes, while FTTN means “fiber to the node” or “neighborhood.”

Tom Nolle, Fiber-optic networks: Access network design

August 10, 2009  4:07 PM

Overheard – WiMAX and LTE

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
For most service providers and consumer, 4G wireless has the potential to deliver 40 Mbps or more of broadband connectivity per user. There are two technologies capable of supporting this requirement: WiMAX from the IEEE and the 3rd Generation Partnership Project (3GPP)’s Long-Term Evolution (LTE).

Tom Nolle,  Three 4G business models emerge for LTE and WiMAX

Operator studies suggest that the migratory WiMAX model is most valuable in cities with large student populations, areas where mass transit is used for commuting in preference to private automobiles, and areas where online video usage has been well-socialized among wireline broadband users.

Where there is a strong wireline content appetite, sustaining that appetite in other places where the user may relax is far easier. On the other hand, in locations where much of the population commutes by car, where the user is older and less likely to view content online at home, and where a large segment of the population of a service area may be moving in from a different area, the mobile-evolution or LTE model is easiest to validate.

August 10, 2009  3:17 PM

Overheard – Metro Ethernet

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
t-rex The ongoing economic downturn is fostering a changing of the guard in telecommunications services. What might look like a business depression is actually providing fertile ground for a shift in technology. It’s traditional TDM switched circuits out. IP based Ethernet connections in.

John Shepler, Ethernet Takes Over, Mbps Prices Fall

Say goodbye to time-division multiplexing (TDM).   Looks like all that dark fiber left over from the dot.com bust is going to be put to good use.

John describes Metro Ethernet and its long haul equivalent, Carrier Ethernet, as LAN extension technologies.  I like that. “LAN extension technologies.”

August 10, 2009  2:01 PM

Overheard – High Speed Packet Access

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
It’s no secret that 4G wireless technology – aka Long Term Evolution and WiMax – is in the works and actually starting to see some deployment. But until then, a 3G technology called High Speed Packet Access, or HSPA, is seeing the big growth numbers around the globe.

Sam Diaz, Growth of 3G wireless broadband illustrates demand for 4G connections

HSPA is a general name for the High-Speed Downlink Packet Access (HSDPA) and High-Speek Uplink Packet Access protocols. They are packet-based mobile telephony protocols used in 3G to increase data capacity and speed up transfer rates. One of the primary differences between HSPA and EV-DO networks is that HSPA allows mobile handsets to transmit voice and data simultaneously.

Jonathan Morgan has written a very interesting post explaining why HSPA is so important.  It all comes down to dollars.

August 5, 2009  2:46 PM

Overheard – Serial-attached SCSI (SAS)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“Beginning late 2006, major network server platform releases embraced 3Gb/s SAS and there has been no looking back.”

Harry Mason, Serial Attached SCSI storage moves ahead in network server designs

Today I’m reading about SAS.

SAS is the only storage connect that embraces both the high-performance and high reliability disk drive offered with SAS connected drives, as well as providing native compatibility with low-cost per gigabyte SATA drives.

This capability allows common storage components to span a variety of storage environments, including tiered storage solutions. The ability of the storage system to scale is a critical attribute for enterprise critical data storage solutions.

August 5, 2009  12:22 PM

Overheard – Master data management (MDM)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“You can’t manage what you can’t measure, and many enterprises have few or no resources devoted to measuring or monitoring how users use the information that enables and drives the business.”

Michael Dortch, Building an MDM project plan for manufacturing

Today’s WhatIs.com Word of the Day is master data management (MDM).

Whether a company uses a data discovery and mapping tool or begins by surveying users to ask them ‘manually’ about their information access and use patterns and behaviors, knowledge about current data is the first step towards truly effective MDM.

It doesn’t have to be as elaborate as a true, interconnected real-time data map, but the closer an enterprise can get to that goal as a start, the firmer the foundation of that enterprise’s MDM strategy will be.

August 4, 2009  2:12 PM

Overheard – D2D2T (disk-to-disk-to-tape)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
With D2D2T, you can transfer your data to disk at night at a much faster rate than to tape, and then migrate that data to tape, as you need to.

Phil Pascarelli, D2D2T: is it quite right for you?

Unlike tape emulation, which replaces a tape drive with a virtual hard disk equivalent, D2D2T allows users to manage the storage of data closer to an Information Lifecycle Management (ILM) model. Users can specify the destination and duration of stored data as well as its replication and archive life. In addition, D2D2T offers an excellent data recovery option, allowing instant retrieval of lost or corrupted data. D2D2T is also able to address compliance legislation-based storage requirements.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: