WhatIs.com Word of the Day Archive


September 15, 2008  5:00 PM

Overheard: Berkeley software development

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jeremy_anderson.jpg “There are two major products that came out of Berkeley: LSD and UNIX. We don’t believe this to be a coincidence.”

Jeremy S. Anderson

Be sure to read our three-part series: The future of Unix.

September 15, 2008  2:55 PM

Overheard: Open source forks

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
sam_nurmi.jpg A benefit of open source software is the ability to take the code base of an application and develop it in a new direction. This is, as most of you probably know, called forking, and is very common in the open source community.

Sam Nurmi, 10 interesting open source software forks and why they happened

Interesting list! One of the commenters, Dingo Jones, said that Mac OS X is an Open BSD fork.  That’s the second time I’ve read that.  I guess it makes sense — especially now that we know Google Chrome has Microsoft as one of its ancestors.


September 9, 2008  4:31 PM

Overheard: Explaining IT to the business side – marketecture

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
jason_bloomberg.jpg It seems that every presentation has that one attractively drawn diagram that purports to illustrate how the vendor’s product fits into their customers’ IT environments. Such diagrams, however, rarely have any technical detail since they are not intended for consumption by developers or architects. Rather, they are typically created by marketing people to communicate to analysts, prospective customers, investors and the press. Yes, I’m talking about marketecture.

Jason Bloomberg, What is the shape of a service-oriented architecture?

Ok. So marketecture is the basically a buzzword for explaining things to the business side.  Jason does a good job analyzing the use of diagrams in SOA marchitecture. All of them look sufficiently confusing to me.

 Now, marketecture (“marketing” plus “architecture,” in case you haven’t figured that out yet) serves an important purpose. We’re talking about fairly complex concepts such as distributed computing architectures, and no matter how you cut it, such architectures have a lot of different pieces that talk to each other in numerous different ways. Every vendor must come up with effective approaches for simplifying their message so that people other than hardcore techies can understand it.


September 9, 2008  3:58 PM

Overheard: Hadron and F-BS

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
charles_king.jpg I believe that much of the public reaction to the Large Hadron Collider is grounded in a kind of ignorance that might be called ‘Faith-Based Science,’ or F-BS for short.

Charles King, as quoted in Excitement and Fear Abound Over Super Collider


September 9, 2008  3:36 PM

Overheard: Moving from a culture of “need to know” to one of “need to share”

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
cornelius_doug.jpg ECM is about software. But is also about knowing the workflow of your people, where the information is being stored and how people are using the information.

Doug Cornelius, Enterprise Content Management

I am trying to shift the firm from “ask for permission” to “ask for forgiveness.” At the same time, moving it from a “need to know culture” to a “need to share culture.” I do not think that enterprise content management fits into my approach of collecting my firm’s knowledge.

Doug hit the nail on the head. Part of the problem with Enterprise Content Mangement software is that it’s so permission-driven that the software itself builds up walls and isolates groups from each other. I’m not sure how to get around that though — except to say that good ECM is not just about the software.


September 8, 2008  4:44 PM

Overheard: WEP and weak IVs

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
fogie_seth.jpg The problem arises when you have duplicate IV values. If an attacker knows the content of one of the packets he has the IV for, he can use the collision to extract the contents of the other packet. In other words, an attacker can decrypt data without ever knowing the password. Assuming an attacker can collect enough known IV-data matches, they can comprise the entire network.

Seth Fogie, WPA Part 2: Weak IV’s


September 8, 2008  11:39 AM

Overheard: CEBP is same thing as PBX features

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
eric-krapf2.jpg Communications-Enabled Business Processes, or CEBP, is one of the hot buzzwords in enterprise communications. Many people see CEBP as the Holy Grail of communications technology, something that may be attained years from now. But, in fact, you have CEBP in your enterprise now. It’s called PBX features.

Eric Krapf, You’ve Already Got Communications-Enabled Business Processes


September 4, 2008  2:30 PM

Overheard: Why Sarah Palin became a hacker

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
sarah-palin.jpg The technician “said it looked like he tried to delete this, but she knew a way to go around and get some of the deleted stuff,” Palin said in an interview. “I didn’t know what I was looking for, but I was there.”

Palin explains her actions in Ruedrich case (2004)

Lots of buzz about how Sarah Palin once hacked into Republican boss Randy Ruedrich’s computer back in 2004 at the request of Alaska’s Attorney General. (She was looking for evidence that he’d broken a state ethics law while he was a member of the Alaska Oil & Gas Conservation Commission.)

As a mom with two daughters, I’m proud that we finally have a woman VP candidate again — but I’m even more proud that the technician was a woman.  ;- )


September 4, 2008  1:09 PM

Overheard: Chrome is a do-over

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
steven_levy.gif In the coming era of cloud computing, the Web will be much more than just a means of delivering content — it will be a platform in its own right.

Steven Levy, Inside Chrome: The Secret Project to Crush IE and Remake the Web

I highly recommend Steven Levy’s article on Chrome. He provides a good overview of the project’s cultural and technical background. It was only a matter of time until someone had to re-invent the browser from the ground up. (After all, how many plug-ins can one piece of software have?) It was nice to learn that there was some concern over at Google about Chrome’s affect on Firefox — and that Chrome will remain open source.

And if you wondered where the name came from, here you go:

A less weighty issue was what to dub the product. After considering some ridiculous codenames (Upson says they were so awful that he took the un-Googly step of a top-down veto), the project borrowed its moniker from the term used to describe the frame, toolbars, and menus bordering a browser window: chrome.


September 3, 2008  11:39 AM

Overheard: Deduplicating data and meeting nonrepudiation compliance requirements

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
tape_backup.jpg Dedupe does not change data any more than compression changes data, or traditional file systems change data. Plain old LZ compression gives you a different output bitstream than what went in, with redundant parts removed, just like deduplication. But when you decompress the file, you get your exact original bitstream back. No information is lost.

Conventional file systems break up files into blocks and scatter those blocks across one or more disks, requiring complicated algorithms to retrieve and reassemble the data. Dedupe is no different. Nonrepudiation requirements are satisfied by the reliability and immutability of the system as a whole, deduplicating or not.

Jered Floyd, Deduplication is Not a Crime


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: