|Peppermint combines the base Linux operating system with a number of cloud-based applications and services. The result is a lightweight distribution, but with integrated access to some of the most popular online apps. Better yet, Peppermint uses Mozilla Labs Prism so the cloud-based software looks and acts like desktop software.
Matthew Humphries, Cloud-focused Peppermint Linux OS now available
Today’s WhatIs.com Word of the Day is Peppermint.
|All EU-wide legislation must be “transposed” into nation-specific law by the European Union’s 27 member states; keeping those transpositions in harmony can be difficult, and the Transparency Directive is no exception.
Jeremy Woolfe, EU Transparency Directive Seeks to Reshape Reporting
Today’s WhatIs.com Word of the Day is EU Transparency Directive.
Today’s WhatIs.com Word of the Day is National Quality Forum (NQF).
There are six defined categories for SREs:
• Surgical (for example, an instrument left in a patient)
• Product or device (for example, a malfunctioning respirator)
• Patient protection (for example, a baby is discharged to the wrong person)
• Care management (for example, the patient receives the wrong medication)
• Environment (for example, the patient falls in a health care facility)
• Criminal event (for example, the sexual assault of a patient)
Today’s WhatIs.com Word of the Day is serious reportable event (SRE).
|Trigger data such as life events, birth of a child, death in the family, household move, or bankruptcies create an opportunity to influence customer responses.|
Today’s WhatIs.com Word of the Day is customer intelligence.
Leveraging customer intelligence often requires change. Organizational behaviors, business process workflows, as well as technology enablers will require modification in order to succeed. In addition, new skill sets and statistical data-driven expertise will need to be acquired, either through training, selective hiring or engagement with managed services providers.
|A lot of these agencies are built on infrastructures that can’t handle the demand, especially when you put out that information on the public domain.
Vivek Kundra, Gov 2.0 Summit
Today’s WhatIs.com Word of the Day is Open Government Directive.
Guest blogger: Crystal Bedell
Open Government Directive provides requirements for the online publication of government data. U.S. executive departments and federal agencies are required to release public information online in machine-readable, open formats, thereby exposing their operations to the public. They are also required to integrate public participation in the policy-making process.
The Office of Management and Budget issued the Open Government Directive and its instructions in 2009 by order of President Barack Obama. The Open Government Directive’s goal is to promote transparency, participation, and collaboration between the federal government and the public. The transparency that comes with online disclosure is intended to promote accountability and enable public participation in the policy-making process.
To comply with the mandate, agencies had to identify “high-value information” that was already available online, identify “high-value information” that was not online but would be, and establish a timeline for that data’s publication. There has been some confusion, however, as to what data constitutes high value. The Open Government Directive definition of high-value information is very broad, including data that can “increase agency accountability and responsiveness; improve public knowledge of the agency and its operations; further the core mission of the agency; create economic opportunity; or respond to need and demand as identified through public consultation.”
In addition to publishing public data, each agency must publish an /Open page on its Web site (e.g., www.justice.gov/open) that discloses the agency’s efforts in regards to the initiative and engages the public, looking for help and feedback on its processes.
|For many decades, security engineering was a specialized topic, primarily considered within military organizations or by those working with them. Standards like TCSEC and ITSEC from the 1980s and 1990s, and later the Common Criteria, described the software-engineering activities needed to develop and validate security-critical systems.
Dr. David Basin, Integrating security into the system development process
Today’s WhatIs.com Word of the Day is Common Criteria.
|“One of the most painstaking web programming tasks is achieving web accessibility. Although estimates vary, between 5 and 10% of Web users have some sort of accessibility need.”
Nick Kellett, Sharepoint Accessibility
Today’s WhatIs.com Word of the Day is Section 508. According to a Sharepoint tutorial on SearchWinDevelopment.com, SharePoint 2007 outputs a lot of code that is not compliant with Section 508 or other accessibility regulations.
|Not surprisingly, analyzing unstructured content across the enterprise is an expensive undertaking. If it weren’t, the mega-vendors like SAP and IBM probably wouldn’t be interested in it.|
Today’s WhatIs.com Word of the Day is text mining.
|While 100 Gigabit Ethernet is the key for the service provider core, we believe better economics will drive adoption of 40 Gigabit in enterprise data centers.|
Today’s WhatIs.com Word of the Day is 100 Gigabit Ethernet.