THE WHATIS.COM WORD-OF-THE-DAY 
May 10, 2004

Kibi, mebi, gibi, tebi, pebi, and all that 
_____________
SPONSORED BY: SearchOracle.com

SearchOracle.com features unbiased database industry news, technical
tips, informative webcasts, white papers and more - all designed to
help IT pros tackle their toughest database issues with ease.
Newsletters are available on a range of topics, including Oracle
administration and E-Business Suite - click here for a full list: 
http://searchOracle.com/r/0,,18966,00.htm?track=NL-34&ad=482432

______________________   
TODAY'S WORD: Kibi, mebi, gibi, tebi, pebi, and all that 

Kibi, mebi, gibi, tebi, pebi, and exbi are binary prefix multipliers
that, in 1998, were approved as a standard by the International
Electrotechnical Commission (IEC) in an effort to eliminate the
confusion that sometimes occurs between decimal (power-of-10) and
binary (power-of-2) numeration terms. 

At present, the prefix multipliers kilo- (k or K), mega- (M), giga-
(G), tera- (T), peta- (P), and exa- (E) are ambiguous. In most of the
physical sciences, and when describing quantities of objects
generally, these multipliers refer to powers of 10. However, when
used to define data quantity in terms of bytes, they refer to powers
of 2. 

See our complete definition with prefix and symbol tables at
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci825099,00.html?track=NL-34&ad=482432

______________________
RELATED TERMS:

Kilo, mega, giga, tera, peta, and all that
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci499008,00.html?track=NL-34&ad=482432

______________________
SELECTED LINKS:

The NIST Reference on Constants, Units, and Uncertainty describes the
IEC prefixes for binary multiples. 
http://physics.nist.gov/cuu/Units/binary.html 

_____________________
TODAY'S TECH NEWS:

SASSER CREATOR ARRESTED
German high school student arrested in connection with writing and
distributing the Sasser worm, which antivirus experts estimate has
attacked tens of millions of PCs across the world. 
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci963205,00.html?track=NL-34&ad=482432
 

ON SECURITY, IS CISCO THE NEXT MICROSOFT?
After a flood of recent security vulnerabilities, some wonder if
Cisco's security track record is becoming as tarnished as
Microsoft's. Though the networking giant is wearing a bigger target
than ever, experts say good communication and best practices are the
best tools for keeping Cisco gear safe. 
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci963204,00.html?track=NL-34&ad=482432
 

USERS FEEL SARBANES PAINS
The cost and workload of meeting the deadline for Sarbanes-Oxley
compliance is taxing large and small companies alike. Some question
whether it will ultimately be a waste of money. 
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci963120,00.html?track=NL-34&ad=482432
 

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34&ad=482432

______________________
SECRET WORD-OF-THE-DAY | What is IT?

This is garden variety malware that self-replicates and lives in
active memory. 

Do you think you know the Secret Word? Click to see if you're right!
http://searchstorage.techtarget.com/gDefinition/0,294236,sid5_gci213386,00.html?track=NL-34&ad=482432
 

______________________
HOROSCOPES FOR GEEKS | May

Find out what the universe has in store for you this month!
http://searchcio.techtarget.com/sDefinition/0,,sid19_gci919205,00.html?track=NL-34&ad=482432
 

______________________
TOP TWENTY STORAGE TERMS | May 

Do you speak geek? How many of these storage terms can you define
without looking?
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci961523,00.html?track=NL-34&ad=482432

______________________________ 
RECENT ADDITIONS AND UPDATES 

(1) zettabyte 
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci963097,00.html?track=NL-34&ad=482432
 

(2) yottabyte 
http://searchstorage.techtarget.com/sDefinition/0,,sid5_gci963074,00.html?track=NL-34&ad=482432
 

(3) keystroke logger
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci962518,00.html?track=NL-34&ad=482432
 

(4) Augusta Ada King, countess of Lovelace 
http://whatis.techtarget.com/definition/0,,sid9_gci960405,00.html?track=NL-34&ad=482432
 

(5) Chameleon Card 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci960262,00.html?track=NL-34&ad=482432
 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This e-newsletter is published by WhatIs.com, a targeted Web site
from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2004 TechTarget. All rights reserved.
_____________________________________________________________________

To unsubscribe from "Word of the Day":
 
Go to unsubscribe: http://WhatIs.com/u?cid=482432&lid=430801&track=NL-34
 
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.
 
Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494

Reply via email to