THE WHATIS.COM WORD-OF-THE-DAY   
August 22, 2003

Asimov's Three Laws of Robotics 
________________
SPONSORED BY: Microsoft

The Quick Guide to Windows Server 2003. Get the latest information on
installation, new features and training. Click here!
http://WhatIs.com/r/0,,17306,00.htm?microsoft 

________________   
TODAY'S WORD: Asimov's Three Laws of Robotics 
 
See our complete definition with hyperlinks at
http://whatis.techtarget.com/definition/0,,sid9_gci520366,00.html 

Science-fiction author Isaac Asimov is often given credit for being
the first person to use the term robotics in a short story composed
in the 1940s. In the story, Asimov suggested three principles to
guide the behavior of robots and smart machines. Asimov's Three Laws
of Robotics, as they are called, have survived to the present: 

1. Robots must never harm human beings or, through inaction, allow a
human being to come to harm. 

2. Robots must follow instructions from humans without violating the
first rule. 

3. Robots must protect themselves without violating the other rules. 
 
______________________
RELATED TERMS:

robot
http://whatis.techtarget.com/definition/0,,sid9_gci519835,00.html 

artificial intelligence 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci211597,00.html 

robotics 
http://whatis.techtarget.com/definition/0,,sid9_gci520361,00.html 

nanorobot 
http://whatis.techtarget.com/definition/0,,sid9_gci519843,00.html 

_____________________
SELECTED LINKS:

At the Australian National University, Roger Clarke examines the
implications of Asimov's Laws for information technology.  
http://www.anu.edu.au/people/Roger.Clarke/SOS/Asimov.html  

______________________
TODAY'S TECH NEWS:

DBAS STRIVE FOR CODE OF ETHICS
For the first time, a session at The Data Warehouse Institute (TDWI)
annual conference was dedicated to establishing a code of ethics for
database administrators. 
http://searchdatabase.techtarget.com/originalContent/0,289142,sid13_gci920641,00.html 

MOBILE MESSAGING GETS A PUSH
An emerging technology called push messaging is helping mobile
messaging users to get information instantly without tedious button
pressing. An electricity company is using technology from JP Mobile
to make sure its employees get messages during emergencies. 
http://searchmobilecomputing.techtarget.com/originalContent/0,289142,sid40_gci920522,00.html
 

THE CIO MAKEOVER: FROM CTO TO CFO OF IT
Now more than ever, CIOs need to prove their organization's
contribution to overall business performance. This includes showing
how IT spending results in bottom-line impact and drives strategic
and competitive advantage. As a result, CIOs are shifting their focus
to business-oriented goals rather than technological ones. 
http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci920494,00.html 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com/ 

______________________
Crash Course | OSI model

The OSI model is the conceptual backbone of most enterprise networks,
but how well do you understand it? Read our rundown of the OSI model
and find out what all those layers do. 
http://searchnetworking.techtarget.com/featuredTopic/0,290042,sid7_gci917009,00.html 

______________________
Secret Word-of-the-Day | What is IT?

HINT: This is is one billionth of a second. It is a common
measurement of read or write access time to random access memory
(RAM). 

>> Think you know the Secret Word-of-the-Day? See if you're right!
http://whatis.techtarget.com/definition/0,,sid9_gci212620,00.html

_____________________
Quiz #19 | Artificial Intelligence

How much do you know about AI? Take this week's quiz and find out! 

>> Click to take the quiz
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci789222,00.html 

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] dark energy 
http://whatis.techtarget.com/definition/0,,sid9_gci917929,00.html 

[2] strawman 
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci840566,00.html 

[3] refactoring 
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919168,00.html

[4] initial extent
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci916333,00.html

[5] IT Crossword Puzzle: Malware 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci916579,00.html 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

LOWELL THING, Site Editor ([EMAIL PROTECTED])
____________________________________________________________________

MARGARET ROUSE, Associate Editor ([EMAIL PROTECTED])


:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Word of the Day":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://WhatIs.com/u
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to