Word of the Day: Tech Definitions from WhatIs.com

February 23, 2010  6:20 PM

Overheard – collocation

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“If you look at computing services as a car, cloud computing is like the rental car you pick up at the airport – it’s not a good option for long-term use. Managed hosting [collocation] is more like a car you lease long-term. You know what you’re getting and how much it will cost.”

Antonio Piraino, Cloud computing versus colocation: What’s the right fit?

Today’s WhatIs.com Word of the Day is collocation.

February 22, 2010  1:38 PM

Overheard – motherboard tattoo

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“Odds are your PC came with a recovery disc, a CD with all the programs and drivers that were installed on its hard drive when it was new. The odds are also that you have absolutely no idea where that disc is.”
David A. Karp, Build an XP-SP2 Recovery Disc

Today’s WhatIs.com Word of the Day is motherboard tattoo.

If you bought your PC at BestBuy, you’ll want to read what David has to say about getting a full install of Windows — who knew???

The first ingredient, the Windows XP CD, may prove the most troublesome, simply because many manufacturers omit it in lieu of some sort of customized “express install” recovery disc.  If Windows came preinstalled on your PC but the manufacturer didn’t provide a full Windows XP CD, contact the company and ask for one (you did pay for it, after all). In most cases, you’ll get one for free, no questions asked.

February 18, 2010  3:01 PM

Overheard – social computing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

“It really boils down to this: Employees know a lot of stuff. Social computing systems make it easy for everyone else to share and ultimately benefit from that knowledge.”Paul Galvin, A case for social computing in the enterprise

Today’s WhatIs.com Word of the Day is social computing.

Like many new technology-driven concepts, social computing can be a little confusing as a term. Definitions run the gamut, but many people will agree that social computing is both a process and supporting tool set that enable individuals within an enterprise to contribute their knowledge and insight about the business. Social computing makes business knowledge easily searchable and accessible to everyone in the enterprise at any time through a number of search avenues.

February 17, 2010  1:36 PM

Overheard – Credit CARD Act

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“While companies can’t hike your rates on existing balances unless you’re 60 days late with a payment, they can raise rates on future purchases any time and for any (or no) reason. They do have to tell you this, but they’ll probably send it in an envelope that looks like junk mail in the hopes you’ll throw it out.”

Lauren Bowne, as quoted in Beware: Loopholes in the Credit CARD Act you need to know about

Today’s WhatIs.com Word of the Day is Credit CARD Act.

Martha White provides a great overview of the Credit CARD Act’s “gotchas” in her interview with Lauren Bowne.

While the CARD Act has limits on the severity of penalty fees you can be charged, there’s no rule against card companies making up as many new fees as they can conjure and charging whatever they like for them.

February 16, 2010  2:05 PM

Overheard – Security as a service

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
IT security typically has been deemed one of those services best provided in-house. But the stigma attached to outsourcing security and Security as a Service — namely that an outsider does not know your company well enough to protect it — may be falling away, as businesses look for more ways to cut costs.

Linda Tucci,  Options for outsourcing security grow, offer IT budget savings

Today’s WhatIs.com Word of the Day is Security as a Service.

A word about definitions: Like most IT monikers, Security as a Service takes various shapes.

It can refer to a traditional managed services model, in which a company hires an outside provider to configure, manage and even maintain its security infrastructure. These services can be dispatched remotely using a connection over the Internet.

Another model, “in-the-cloud” services, allows a company to use security technologies that are not located on its premises. One such cloud service that has gained traction is email security: Companies point their email to a cloud-based provider for cleansing before it’s delivered to the on-premise mail server.

Web security is also catching on, as cloud-based providers have resolved latency issues.

A third model, Security as a Utility, usually refers to an arrangement in which companies pay a monthly fee to lease security hardware for their premises and pay for the services to manage and maintain it.

February 12, 2010  11:32 AM

Overheard – Emotional intelligence and soft skills

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“Historically, if you were the network administrator, the network was yours. You controlled everything. The network was your domain.  In this new world, you may have to become an ‘influencer,’ which means you’re going to have to be able to advise your organization about what’s good and what’s bad to put in the cloud … and a lot of network administrators are short on those soft skills.”

James Staten, as quoted in IT job security fears over cloud computing? Network jobs still vital

Today’s WhatIs.com Word of the Day is emotional intelligence.  See also: soft skills.

February 10, 2010  7:59 PM

Overheard – Scrum sprints

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Smaller teams seem to gravitate towards short sprints, around two to three weeks. Planning’s are pretty simple and quick. The short sprint allows for the team to turn around things really quickly, and I personally like it a lot as product owner.

Brian Hartsock, Scrum Tip: Sprint length is a variable

Today’s WhatIs.com Word of the Day is Scrum sprint.

February 5, 2010  6:41 AM

Overheard – Regional Internet Registry

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
The Number Resource Organization (NRO) announced that less than 10% of the remaining IPv4 addresses are unallocated, and that puts IPv4 on the endangered species list.  What’s NRO? The group that officially represents the five Regional Internet Registries that oversee Internet number resources.Kate Gerwig, Move away from IPv4…This is not a test

Today’s WhatIs.com Word of the Day is Regional Internet Registry (RIR).

February 3, 2010  6:17 PM

Overheard – mobile browser

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
If Google’s vice president of engineering is right, it means that many developers might be wasting time trying to port their application to various mobile platforms out there. Build for the mobile browser; it might not look like a very good idea now, but it could pay off in the future.

Stan Schroeder, Google: Browser is the Platform of the Future, Even on Mobiles

Today’s WhatIs.com Word of the Day is mobile browser.

February 2, 2010  4:53 PM

Overheard – Wireless Distribution System

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
WDS uses standard 802.11 wireless to forward traffic between access points, as an alternative to Ethernet or another wired distribution network. In effect, WDS turns a pair of APs into a pair of wireless bridges or repeaters…WDS is based on the 802.11 standard, but is not fully specified by that standard, so WDS links often work only between same-vendor APs (or APs using the same chipset).

Lisa Phifer, What’s the expected range on a pair of Belkin 54G routers in wireless bridge mode?

Today’s WhatIs.com Word of the Day is Wireless Distribution System.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: