THE WHATIS.COM WORD-OF-THE-DAY August 22, 2003 Asimov's Three Laws of Robotics ________________ SPONSORED BY: Microsoft
The Quick Guide to Windows Server 2003. Get the latest information on installation, new features and training. Click here! http://WhatIs.com/r/0,,17306,00.htm?microsoft ________________ TODAY'S WORD: Asimov's Three Laws of Robotics See our complete definition with hyperlinks at http://whatis.techtarget.com/definition/0,,sid9_gci520366,00.html Science-fiction author Isaac Asimov is often given credit for being the first person to use the term robotics in a short story composed in the 1940s. In the story, Asimov suggested three principles to guide the behavior of robots and smart machines. Asimov's Three Laws of Robotics, as they are called, have survived to the present: 1. Robots must never harm human beings or, through inaction, allow a human being to come to harm. 2. Robots must follow instructions from humans without violating the first rule. 3. Robots must protect themselves without violating the other rules. ______________________ RELATED TERMS: robot http://whatis.techtarget.com/definition/0,,sid9_gci519835,00.html artificial intelligence http://searchcio.techtarget.com/sDefinition/0,,sid19_gci211597,00.html robotics http://whatis.techtarget.com/definition/0,,sid9_gci520361,00.html nanorobot http://whatis.techtarget.com/definition/0,,sid9_gci519843,00.html _____________________ SELECTED LINKS: At the Australian National University, Roger Clarke examines the implications of Asimov's Laws for information technology. http://www.anu.edu.au/people/Roger.Clarke/SOS/Asimov.html ______________________ TODAY'S TECH NEWS: DBAS STRIVE FOR CODE OF ETHICS For the first time, a session at The Data Warehouse Institute (TDWI) annual conference was dedicated to establishing a code of ethics for database administrators. http://searchdatabase.techtarget.com/originalContent/0,289142,sid13_gci920641,00.html MOBILE MESSAGING GETS A PUSH An emerging technology called push messaging is helping mobile messaging users to get information instantly without tedious button pressing. An electricity company is using technology from JP Mobile to make sure its employees get messages during emergencies. http://searchmobilecomputing.techtarget.com/originalContent/0,289142,sid40_gci920522,00.html THE CIO MAKEOVER: FROM CTO TO CFO OF IT Now more than ever, CIOs need to prove their organization's contribution to overall business performance. This includes showing how IT spending results in bottom-line impact and drives strategic and competitive advantage. As a result, CIOs are shifting their focus to business-oriented goals rather than technological ones. http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci920494,00.html >> Catch up on all the latest IT news at http://searchtechtarget.techtarget.com/ ______________________ Crash Course | OSI model The OSI model is the conceptual backbone of most enterprise networks, but how well do you understand it? Read our rundown of the OSI model and find out what all those layers do. http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci917009,00.html ______________________ Secret Word-of-the-Day | What is IT? HINT: This is is one billionth of a second. It is a common measurement of read or write access time to random access memory (RAM). >> Think you know the Secret Word-of-the-Day? See if you're right! http://whatis.techtarget.com/definition/0,,sid9_gci212620,00.html _____________________ Quiz #19 | Artificial Intelligence How much do you know about AI? Take this week's quiz and find out! >> Click to take the quiz http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789222,00.html ______________________________ RECENT ADDITIONS AND UPDATES [1] dark energy http://whatis.techtarget.com/definition/0,,sid9_gci917929,00.html [2] strawman http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci840566,00.html [3] refactoring http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919168,00.html [4] initial extent http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci916333,00.html [5] IT Crossword Puzzle: Malware http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916579,00.html ____________________________________________________________________ ::::::::::::::::::: WHATIS.COM CONTACTS ::::::::::::::::::: LOWELL THING, Site Editor ([EMAIL PROTECTED]) ____________________________________________________________________ MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED]) ::::::::::::::::::::: ABOUT THIS NEWSLETTER :::::::::::::::::::::: This newsletter is published by TechTarget, the most targeted IT media. http://www.techtarget.com Copyright 2003 TechTarget. All rights reserved. ____________________________________________________________________ To unsubscribe from "Word of the Day": Reply to this e-mail with REMOVE in the Subject line - OR - Go to unsubscribe: http://WhatIs.com/u Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.