|The growing role of health information and communication technologies (HICT) has created the need to broaden and deepen the pool of workers who are able to help organizations deal effectively with their investment in information technology…
American Medical Informatics Association, Informatics Fact Sheet
Today’s WhatIs.com Word of the Day is health informatics.
|The fundamental difference between Red Hat Advanced Server or Enterprise Linux and Fedora is that Red Hat Enterprise Linux is meant for commercial use, while Fedora is for the developer community and for those that want Linux for personal use.|
Today’s WhatIs.com Word of the Day is Fedora.
There are several ways to install a clean version of Windows 7 on enterprise desktops. And regardless of the method, the process may be easier than upgrading from Windows XP or Windows Vista.Mark Brownstein, How to install a clean version of Windows 7
Today’s WhatIs.com Word of the Day is clean install.
|In 2006 we were building distributed applications that needed a master, aka coordinator, aka controller to manage the sub processes of the applications. It was a scenario that we had encountered before and something that we saw repeated over and over again inside and outside of Yahoo!.
Benjamin Reed, An Introduction to ZooKeeper Video
Today’s WhatIs.com is the Word of the Day is Zookeeper.
|If stored wind or solar energy instead of natural gas plants can be used to generate power when the wind is not blowing or the sun is not shining, less natural gas will be burned to provide dispatchable power.|
Today’s WhatIs.com Word of the Day is compressed air energy storage. The definition is adopted from a blog post by Dr. Joseph Romm called “The Holy Grail of clean energy economy is in sight: Affordable storage for wind and solar.”
|“Turning hijacked computers into cash is still hard work for most computer criminals. They’ve got to trick the infected PC into sending spam, then trick a recipient into buying a useless product — or they have to steal online banking passwords, log onto a victim’s account, bypass the bank’s money transfer fraud controls and so on. It’s much easier to just demand cash directly from infected users — a crime that’s the Internet’s equivalent of kidnapping.”
Bob Sullivan, Give me your money, or your computer gets it
Today’s WhatIs.com Word of the Day is ransomware.
|Meaningful use is more than just the incentives or even the information technology… meaningful use is all about how you’re practicing medicine.
Joseph Fortuna, Providers consider how to overcome EHR meaningful use obstacles
Today’s WhatIs.com Word of the Day is meaningful use.
|Remember the days when you would ‘shake it like a Polaroid picture?’ Dell has introduced a new player in the inkless printer world, a pocket printer called the Dell Wasabi. Any device with PictBridge capability can be used to print out full color prints.
Sarah Meyer, Dell Wasabi review
Today’s WhatIs.com Word of the Day is PictBridge.
|Zeus is the biggest banking Trojan out there. It’s the nastiest, most sophisticated Trojan I’ve ever seen. It’s a money-stealing machine.
Laura Mather, Zeus Trojan hitting banking customers hard
Today’s WhatIs.com Word of the Day is Zeus Trojan toolkit.
|For every single human being punching phone numbers or surfing the net on the T-Mobile network, there could be four machines chirping away quietly, embedded in utility meters, cars, freight containers, medical equipment, wristwatches and even the oversized flashlights carried by cops.
Kevin Fitchard, T-Mobile: M2M connections to outnumber humans 4-to-1
Today’s WhatIs.com Word of the Day is machine-to-machine (M2M).