THE WHATIS.COM WORD-OF-THE-DAY August 19, 2003 nomadicity ________________ SPONSORED BY: AMD
64-bit computing software If you need more performance or are developing new applications, you may want to consider migrating from 32-bits to 64-bits. Wondering how much work is involved and which enterprise apps will most benefit? Find out here. http://WhatIs.com/r/0,,17148,00.htm?amd ________________ TODAY'S WORD: nomadicity See our complete definition with hyperlinks at http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci848266,00.html Nomadicity is the tendency of a person, or group of people, to move with relative frequency. Leonard Kleinrock and others have written of the need to support today's increasingly mobile workers with nomadic computing, the use of portable computing devices and, ideally, constant access to the Internet and data on other computers. Standards such as the IETF's Mobile IPv6 standards and Dynamic Host Configuration Protocol (DHCP) can be said to support nomadic computing. According to Kleinrock, the goal of nomadic computing is to enable a consistent experience for users anywhere in the world, including as they travel from one place to another. A nomadic environment is said to be one that is transparent to the user, regardless of location, the device and platform they're using, the available bandwidth, and whether or not they are in motion at any given time. ______________________ RELATED TERMS: nomadic computing http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci848042,00.html Mobile IPv6 http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci847445,00.html Dynamic Host Configuration Protocol http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213894,00.html _____________________ SELECTED LINKS: Travler is a UCLA project about nomadic computing that is funded by DARPA. http://fmg-www.cs.ucla.edu/travler98/welcome.html ______________________ TODAY'S TECH NEWS: UPDATE: NEW WORM EXPLOITS, PATCHES RPC FLAW Another worm that exploits the RPC-DCOM vulnerability appeared today. This one comes with a twist: It tries to repair the critical Windows flaw it exploits. http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci919945,00.html MEMBERS OFFER GLIMPSE INSIDE WS-I CONSORTIUM In an interview, leaders of the WS-I talk about the inner workings of the group and details of the new Basic Profile guidelines for Web services interoperability. http://searchwebservices.techtarget.com/originalContent/0,289142,sid26_gci919829,00.html MICROSOFT AVOIDS LOVSAN'S BITE Microsoft took preventative measures and steered clear of damage from the Lovsan worm, which was programmed to launch a distributed denial-of-service attack against update page. http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci919892,00.html >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com/ ______________________ Learning Path | Malware: Worms, viruses, and other malicious code Read our series of abbreviated definitions in sequence and be the malware Know-It-All at your office. http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci915380,00.html ______________________ Secret Word-of-the-Day | What is it? HINT: This is resetting your computer so that the microprocessor runs faster than the manufacturer-specified speed. >> Think you know the Secret Word-of-the-Day? See if you're right! http://whatis.techtarget.com/definition/0,,sid9_gci212732,00.html _____________________ Quiz #19 | Artificial Intelligence How much do you know about AI? Take this week's quiz and find out! >> Click to take the quiz http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789222,00.html ______________________________ RECENT ADDITIONS AND UPDATES [1] dark energy http://whatis.techtarget.com/definition/0,,sid9_gci917929,00.html [2] strawman http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci840566,00.html [3] refactoring http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919168,00.html [4] initial extent http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci916333,00.html [5] IT Crossword Puzzle: Malware http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916579,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED]) ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com Copyright 2003 TechTarget. All rights reserved. Unsubscribe from 'Word of the Day' - Simply Reply to this E-mail with REMOVE within the Body or Subject > or - Go to: http://WhatIs.techtarget.com/register - Log in to edit your profile. - Click on the link to Edit email subscriptions. - Uncheck the box next to the newsletter you wish to unsubscribe from. - When finished, click "Save Changes to My Profile."