THE WHATIS.COM WORD-OF-THE-DAY   
August 19, 2003

nomadicity 
________________
SPONSORED BY: AMD

64-bit computing software 
If you need more performance or are developing new applications, you
may want to consider migrating from 32-bits to 64-bits. Wondering how
much work is involved and which enterprise apps will most benefit?
Find out here. http://WhatIs.com/r/0,,17148,00.htm?amd 

________________   
TODAY'S WORD: nomadicity
 
See our complete definition with hyperlinks at
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci848266,00.html

Nomadicity is the tendency of a person, or group of people, to move
with relative frequency. Leonard Kleinrock and others have written of
the need to support today's increasingly mobile workers with nomadic
computing, the use of portable computing devices and, ideally,
constant access to the Internet and data on other computers.
Standards such as the IETF's Mobile IPv6 standards and Dynamic Host
Configuration Protocol (DHCP) can be said to support nomadic
computing. 

According to Kleinrock, the goal of nomadic computing is to enable a
consistent experience for users anywhere in the world, including as
they travel from one place to another. A nomadic environment is said
to be one that is transparent to the user, regardless of location,
the device and platform they're using, the available bandwidth, and
whether or not they are in motion at any given time. 

______________________
RELATED TERMS:

nomadic computing
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci848042,00.html

Mobile IPv6 
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci847445,00.html

Dynamic Host Configuration Protocol 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213894,00.html

_____________________
SELECTED LINKS:

Travler is a UCLA project about nomadic computing that is funded by
DARPA.
http://fmg-www.cs.ucla.edu/travler98/welcome.html

______________________
TODAY'S TECH NEWS:

UPDATE: NEW WORM EXPLOITS, PATCHES RPC FLAW
Another worm that exploits the RPC-DCOM vulnerability appeared today.
This one comes with a twist: It tries to repair the critical Windows
flaw it exploits.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci919945,00.html

MEMBERS OFFER GLIMPSE INSIDE WS-I CONSORTIUM
In an interview, leaders of the WS-I talk about the inner workings of
the group and details of the new Basic Profile guidelines for Web
services interoperability.
http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_gci919829,00.html

MICROSOFT AVOIDS LOVSAN'S BITE
Microsoft took preventative measures and steered clear of damage from
the Lovsan worm, which was programmed to launch a distributed
denial-of-service attack against update page.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci919892,00.html

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 

______________________
Learning Path | Malware: Worms, viruses, and other malicious code

Read our series of abbreviated definitions in sequence and be the
malware Know-It-All at your office.
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci915380,00.html 

______________________
Secret Word-of-the-Day | What is it?

HINT: This is resetting your computer so that the microprocessor runs
faster than the manufacturer-specified speed.

>> Think you know the Secret Word-of-the-Day? See if you're right!
http://whatis.techtarget.com/definition/0,,sid9_gci212732,00.html

_____________________
Quiz #19 | Artificial Intelligence

How much do you know about AI? Take this week's quiz and find out! 

>> Click to take the quiz
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789222,00.html 

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] dark energy 
http://whatis.techtarget.com/definition/0,,sid9_gci917929,00.html 

[2] strawman 
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci840566,00.html 

[3] refactoring 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919168,00.html

[4] initial extent
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci916333,00.html

[5] IT Crossword Puzzle: Malware 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916579,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media. http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.


Unsubscribe from 'Word of the Day'
 - Simply Reply to this E-mail with REMOVE within the Body or Subject
>  or
 - Go to: http://WhatIs.techtarget.com/register
 - Log in to edit your profile.
 - Click on the link to Edit email subscriptions.
 - Uncheck the box next to the newsletter you wish 
   to unsubscribe from.
 - When finished, click "Save Changes to My Profile."


Reply via email to