THE WHATIS.COM WORD-OF-THE-DAY   
January 25, 2002

PC philanthropy 
______________
TODAY'S SPONSOR: VeriSign - The Value of Trust

Secure all your Web servers now - with a proven 5-part strategy. The
FREE Server Security Guide shows you how: DEPLOY THE LATEST
ENCRYPTION techniques.  DELIVER TRANSPARENT PROTECTION with the
strongest security without disrupting users. Get your FREE Guide now:
http://ad.doubleclick.net/clk;3823840;5058249;m?http://www.verisign.com/cgi-bin/go.cgi?a=n061273230057000
______________   
TODAY'S WORD: PC philanthropy 

See our definition with hyperlinks at
http://searchwebmanagement.techtarget.com/sDefinition/0,,sid27_gci798286,00.html

PC philanthropy is sharing some of the unused resources (mainly
processor cycles) of your personal computer to benefit a social
cause. For example, during the time that your computer is not working
on applications that you're using, it can be working on some small
part of a large-scale problem in medical research or the search for
signals from outer space. Effectively, you and thousands of other PC
users engaged in PC philanthropy become part of a kind of distributed
supercomputer that is doing parallel processing. 

Taking part in PC philanthropy requires that you download a small
program from a Web site that is administering a project. In one
example, this program comes with a screensaver included, so that when
your computer is booted up and the screensaver automatically
activated, the work program starts, too. It then uses your computer's
processor cycles only when no other program in your computer is busy.

PC philanthropy is sometimes described as a form of peer-to-peer
computing, in the sense that many Internet users are joined as peers
in a common effort. One of the first PC philanthropy projects was the
collective analysis of signals from outer space as part of the Search
for Extraterrestrial Intelligence (SETI). 

RELATED TERMS:

supercomputer 
http://search390.techtarget.com/sDefinition/0,,sid10_gci213071,00.html 

parallel processing
http://search390.techtarget.com/sDefinition/0,,sid10_gci212747,00.html 

processor 
http://whatis.techtarget.com/definition/0,,sid9_gci212833,00.html 

peer-to-peer 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci212769,00.html 

SETI
http://whatis.techtarget.com/definition/0,,sid9_gci214195,00.html 
________________________
SELECTED LINKS:

Intel sponsors a PC philanthropy program. 
http://www.intel.com/cure/overview.htm# 

SETI@Home describes its program (and lets you download it). 
http://setiathome.ssl.berkeley.edu/ 

News.com reports on one project in "Peer-to-peer to aid in medical
research." 
http://news.com.com/2100-1001-255211.html?legacy=cnet 

Engaging in unauthorized PC philanthropy at work may get you into
trouble. 
http://www.eweek.com/article/0,3658,s%253D1867%2526a%253D16471,00.asp
______________________
WHATIS.COM POLL:

Would you donate your PC's idle time to a distributed computing
research project?

>>Cast your vote:
http://whatis.techtarget.com/poll/1,289525,sid9,00.html
______________________
KNOW IT ALL QUESTION | #100

This slang term is used to quantify user time at a computer. 

a. milliampere hour 
b. time-to-live (TTL) 
c. nanoseconds 
d. mouse miles 

>>CLICK for correct answer
http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci798606,00.html
 
_________________________
FREE SUBSCRIPTION TO STORAGE MAGAZINE

Learn about data storage. Storage is now a front and center issue. No
longer "just capacity," storage is a critical IT asset that must be
managed effectively. Increasingly complex, it's become a huge
percentage of many IT budgets. That's why we created Storage
magazine, a new resource to help you set your storage strategy,
manage storage effectively, and make key vendor selection and
architecture decisions. Subscribe today FREE and as a bonus you get
the FREE 42-page Storage Networking special report! Visit
http://ad.doubleclick.net/clk;3802452;5058249;i?http://www.storagemagazine.com
______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] token 
http://whatis.techtarget.com/definition/0,,sid9_gci796060,00.html 

[2] PLUGE pattern 
http://searchsystemsmanagement.techtarget.com/sDefinition/0,,sid20_gci796789,00.html 

[3] black level 
http://whatis.techtarget.com/definition/0,,sid9_gci797392,00.html 

[4] disk duplexing 
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci796504,00.html 

[5] salt 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci795876,00.html 

======================================================== 
If you would like to sponsor this or any techtarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://WhatIs.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to