|“It’s perfectly legal to rip music from a CD and upload it onto an iPod for personal use; why can’t a person do the same with their own copies of movies?”
Brennon Slattery, Why Pick on RealDVD?
It’s sad that RealDVD, with its sophisticated and lawful approach to DVD-copying, had to swallow the wrath of the MPAA. It’s also clear that the DMCA [Digital Millenium Copyright Act of 1998] needs to be updated to reflect the changes in media distribution 11 years later.
|“…If I were to release a piece of software under the MIT License, and then give you a copy, you would be free to modify, sell, and build upon my creation so long as you leave the notice that I was the source of the original work in your adaptation. Licenses like the MIT License and Creative Commons licenses enable me to hold credit for my work while still giving my consumers some freedoms.”
Winslow Dalpe, Why Go Open Source?
Today’s WhatIs.com Word of the Day is MIT license.
||“The two biggest differences between the CDMA and GSM standards are international compatibility and how the networks handle activating phones.”
Adama D. Brown, Brighthand FAQ: What’s the difference between CDMA and GSM?
Outside the U.S. and Canada, most GSM phones will still work, while almost all CDMA phones simply can’t be used overseas.
CDMA phones are activated remotely, by the carrier, using the phone’s serial number, known as the ESN. Since each carrier has a database of all the ESNs that are approved for its network, this lets most CDMA carriers refuse to activate phones not originally intended for their network.
GSM phones are activated differently. Each account is associated with what’s called a SIM card, or Subscriber Identity Module. This card, about the size of a fingertip and the thickness of a piece of paperboard, carries an encrypted version of all the information needed to identify your wireless account to the network. You slip it into the appropriate slot on a GSM phone (usually under the battery) and that phone is ready to use.
|Pushing fiber close to the customer is generically called “deep fiber,” and various acronyms are used to indicate just how deep the fiber is. FTTH means “fiber to the home,” which is the extreme of giving every user an optical-electrical termination. FTTC takes “fiber to the curb,” serving a group of homes, while FTTN means “fiber to the node” or “neighborhood.”
Tom Nolle, Fiber-optic networks: Access network design
Operator studies suggest that the migratory WiMAX model is most valuable in cities with large student populations, areas where mass transit is used for commuting in preference to private automobiles, and areas where online video usage has been well-socialized among wireline broadband users.
Where there is a strong wireline content appetite, sustaining that appetite in other places where the user may relax is far easier. On the other hand, in locations where much of the population commutes by car, where the user is older and less likely to view content online at home, and where a large segment of the population of a service area may be moving in from a different area, the mobile-evolution or LTE model is easiest to validate.
|The ongoing economic downturn is fostering a changing of the guard in telecommunications services. What might look like a business depression is actually providing fertile ground for a shift in technology. It’s traditional TDM switched circuits out. IP based Ethernet connections in.
John Shepler, Ethernet Takes Over, Mbps Prices Fall
HSPA is a general name for the High-Speed Downlink Packet Access (HSDPA) and High-Speek Uplink Packet Access protocols. They are packet-based mobile telephony protocols used in 3G to increase data capacity and speed up transfer rates. One of the primary differences between HSPA and EV-DO networks is that HSPA allows mobile handsets to transmit voice and data simultaneously.
Jonathan Morgan has written a very interesting post explaining why HSPA is so important. It all comes down to dollars.
|“Beginning late 2006, major network server platform releases embraced 3Gb/s SAS and there has been no looking back.”|
Today I’m reading about SAS.
SAS is the only storage connect that embraces both the high-performance and high reliability disk drive offered with SAS connected drives, as well as providing native compatibility with low-cost per gigabyte SATA drives.
This capability allows common storage components to span a variety of storage environments, including tiered storage solutions. The ability of the storage system to scale is a critical attribute for enterprise critical data storage solutions.
|“You can’t manage what you can’t measure, and many enterprises have few or no resources devoted to measuring or monitoring how users use the information that enables and drives the business.”
Michael Dortch, Building an MDM project plan for manufacturing
Today’s WhatIs.com Word of the Day is master data management (MDM).
Whether a company uses a data discovery and mapping tool or begins by surveying users to ask them ‘manually’ about their information access and use patterns and behaviors, knowledge about current data is the first step towards truly effective MDM.
It doesn’t have to be as elaborate as a true, interconnected real-time data map, but the closer an enterprise can get to that goal as a start, the firmer the foundation of that enterprise’s MDM strategy will be.
|With D2D2T, you can transfer your data to disk at night at a much faster rate than to tape, and then migrate that data to tape, as you need to.
Phil Pascarelli, D2D2T: is it quite right for you?
Unlike tape emulation, which replaces a tape drive with a virtual hard disk equivalent, D2D2T allows users to manage the storage of data closer to an Information Lifecycle Management (ILM) model. Users can specify the destination and duration of stored data as well as its replication and archive life. In addition, D2D2T offers an excellent data recovery option, allowing instant retrieval of lost or corrupted data. D2D2T is also able to address compliance legislation-based storage requirements.