Word of the Day: Tech Definitions from WhatIs.com

April 4, 2008  1:51 PM

Overheard: Finger vein ID

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
finger-vein.gif Both finger prints and iris patterns can be more prone to copying by a third person. But finger veins are not directly visible to a third person, which makes them more suitable for security use.

Hitachi spokesman Atsushi Konno, as quoted in Vein recognition touted for ID systems

I wonder if the finger has to be attached to a live person for this technology to work? That makes it even MORE suitable.

April 3, 2008  11:51 AM

Overheard: Microsoft vs. VMware

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
maureen-ogara.jpg In a dig at VMware, Microsoft claims the reason less than 10% of servers are virtualized today is because the schemes available are too complicated and expensive. And in another dig at VMware, Microsoft suggested that Dell, Fujitsu, Fujitsu Siemens, Hitachi, HP, IBM, NEC and Unisys would be pre-installing the final Hyper-V code on their machines. IBM, Dell, HP and Fujitsu Siemens pledged a few weeks ago to pre-install VMware’s freebie ESX 3i bare metal hypervisor on some of their gear.

Maureen O’Gara, Hyper-V Virtually Done

March 31, 2008  1:05 PM

Overheard: Water, electricity, gas and Twitter?

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
rohitbhargava.jpg If last year’s SXSW was Twitter’s coming out party, this year it achieved utility status. A utility is something that is always on, and essential. To lose it would be to thrust yourself into the dark ages. Water, electricity, gas … and Twitter. Sound like an exaggeration? Not for anyone who has spent the last few days watching the incessant live twittering at SXSW.

Rohit Bhargava, 6 Reasons Twitter Rocks and Sucks Simultaneously At SXSW

A look at Twitter just one year ago…

[kml_flashembed movie="http://youtube.com/v/1ouUrDZtMGM" width="425" height="350" wmode="transparent" /]

March 28, 2008  1:54 PM

Overheard: Why the mainframe didn’t die

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
wladawsky-berger.jpg “The mainframe survived its near-death experience and continues to thrive because customers didn’t care about the underlying technology. Customers just wanted the mainframe to do its job at a lower cost, and IBM made the investments to make that happen.”

Irving Wladawsky-Berger as quoted in Why Old Technologies Are Still Kicking

John Belmont shows us IBM’s newest mainframe, the Z10. It has a starting price of about a million dollars.

[kml_flashembed movie="http://www.youtube.com/v/LN4J4mClckA" width="425" height="350" wmode="transparent" /]

March 27, 2008  12:44 PM

Overheard: WildCharge is the real deal

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
katherine_boehret.jpg I set my WildCharge pad up on my nightstand. After a phone chat, I tossed my RAZR cellphone over to the charging pad; four magnetic contact points on the phone’s adapter helped it stick to the pad. A chime indicated my phone made electrical contact and started charging…I really grew fond of not hunting for the correct cord to charge my phone. Instead, I’d finish conversations, reach over and simply drop my phone down as if I was laying it on the table. 

Katherine Boehret, A Pad to Easily Power Up Your Phone

I really want one of these.


March 25, 2008  1:53 PM

Overheard: Forget hiding your SSID — pay attention to what you name it

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
lphifer-sm.jpg Many people (including myself) have tried to “hide” SSID as a security measure. Unfortunately, efforts to hide SSID ultimately fail and degrade overall WLAN performance.

Lisa Phifer, Configuring service set identifiers

SSIDs are analogous to Windows workgroup names. PCs use those names to browse a network neighborhood and discover others in the same workgroup. When a PC actually tries to access a fileshare, permission is determined by computer name, user name and password. Similarly, stations use SSID to discover APs in the same ESS, but access depends upon other parameters like the station’s address, WEP keys and 802.1X credentials. Access requests must carry the right name, but the workgroup or ESS name is not a password – it identifies the resource to be accessed.

March 8, 2008  3:21 PM

Overheard: Egress filtering

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
exit.gif The biggie in regards to Extrusion Detection is what ports are allowed egress at the perimeter. If you are serious about stopping information from leaking out, then you must enforce policy regarding what ports you allow egress, then you must have a way to apply policy to what is traveling egress on those ports. Your culture in regards to “acceptable use” will drive the solution.

Corey Elinburg, Some Thoughts On Data Leakage / Extrusion Prevention

March 8, 2008  3:02 PM

Video: Microsoft data centers

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

[kml_flashembed movie="http://youtube.com/v/c91mSYYIJ5U" width="425" height="350" wmode="transparent" /]

March 8, 2008  2:37 PM

Video: Jack St. Clair Kilby, inventor of the integrated circuit

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

[kml_flashembed movie="http://youtube.com/v/F4ZaFlcNynM" width="425" height="350" wmode="transparent" /]

March 8, 2008  12:18 PM

Video: Blogger Robert Scoble talks about how he manages his email

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

[kml_flashembed movie="http://youtube.com/v/AKabY1iPaBQ" width="425" height="350" wmode="transparent" /]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: