|“Master data management? We didn’t even know the words existed three months ago.”
Jonathan G.R. Spaetzel, as quoted in Master data management adoption ‘broad but shallow’ across industries
Today’s WhatIs.com Word of the Day is master data management.
|What type of traffic inspection do you need? This is where the buzzwords start to come into play. Every vendor out there has a different trademark for their traffic-inspection technology, but there are essentially three different options: packet-filtering, stateful-inspection and application-proxy firewalls.
Mike Chapple, How to choose a firewall
Today’s WhatIs.com Word of the Day is stateful inspection.
|“At Google, we like to reflect the ever changing world of our users through the logo designs on our homepage. These ‘doodles’ celebrate different people, events or special dates. Whenever we change these doodles we receive a lot of public interest.”
Wael Ghonim, as quoted in Doodle your Logo like Google!
If you have a few minutes to spare, take an interesting tour at Google’s museum of Google Doodles. Many of them are location-specific. Don’t you wish we had a holiday called “Moon Viewing Day” too?
Today’s WhatIs.com Word of the Day is degaussing.
|“The Tiny Read bookmarklet will reformat your current web page into a printer friendly format. It actually changes the default CSS style of a site and renders it again using the print stylesheet.”|
Today’s WhatIs.com Word of the Day is bookmarklet. Amit has put together a very handy list of bookmarklets. I absolutely LOVE the one he talks about above — it saves a lot of paper!
|“In an even more sophisticated ploy, the Trojan altered the victim’s online banking page to change the amount of the transfer to a smaller number. In one transaction, the cybercriminals stole more than $8,000, but to the victim, it appeared like a $53 transaction.”
Angela Moscaritolo, URLZone touted as most sophisticated banking Trojan yet
Today’s WhatIs.com Word of the Day is RAT. It’s a type of malware horse.
|“Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations that go over computers instead of a regular phone line.”
Jordan Robertson, Wiretapping Skype calls: virus eavesdrops on VoIP
Today’s WhatIs.com Word of the Day is VoIPSA.
|“Western philosophy may be summarized as, ‘if it ain’t broke, don’t fix it.’ The Kaizen philosophy is to ‘do it better, make it better, improve it even if it isn’t broken — because if we don’t, we can’t compete with those who do.”
Steve Hudgik, Introduction to Kaizen
Today’s WhatIs.com Word of the Day is kaizen.
|“A unified computing system brings certain service benefits. What it really comes down to is one throat to choke.”
Marc Staimer, Defining ‘unified computing systems’
Today’s WhatIs.com Word of the Day is unified computing system.
|“The new FISMA requirements call for government agencies and DoD contractors to comply with a set of prioritized controls that reflect their ability to detect and stop cyberattacks.”
Alexander B. Howard, ICE Act would restructure cybersecurity rule, create White House post
Today’s WhatIs.com Word of the Day is FISMA.