Tuesday, August 16, 2005

Word of the Day: daisy chain

WhatIs.com: Word of the Day
August 17, 2005
___________________________________

ISSUE SPONSORED BY: IT Conversations

......................................................................
IN THIS ISSUE

-- Word of the Day: daisy chain
-- Today's Tech News
-- Brain Food
-- Additions and Updates

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

IT Conversations

New Ideas Through Your Headphones
Couldn't make it to that great tech conference? Want to hear from the
hottest, most inspirational and entertaining speakers while you
commute or workout? IT Conversations brings you audio from Pop!Tech,
Supernova, all the O'Reilly Media events and more. Stream at your
desk or download to your MP3 player or iPod. And it's all free.
Click here:
http://ad.doubleclick.net/clk;18703186;10410964;c?http://www.itconversations.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

TODAY'S WORD: daisy chain

A daisy chain is an interconnection of computer devices, peripherals,
or network nodes in series, one after another. It is the computer
equivalent of a series electrical circuit. In personal computing,
examples of "daisy-chainable" interfaces include Small Computer
System Interface (SCSI) and FireWire, which allow computers to
communicate with peripheral hardware such as disk drives, tape
drives, CD-ROM drives, printers, and scanners faster and more
flexibly than previous interfaces.

The main advantage of the daisy chain is its simplicity. Another
advantage is scalability. The user can add more nodes anywhere along
the chain, up to a certain maximum (16 in SCSI-2 or SCSI-3, for
example). A daisy-chain network can be long in terms of the distance
from one end to the other, but is not well suited to situations where
nodes must be scattered all over a geographic region. In such a case,
the cables must zig-zag around, and the overall length of the network
can become huge compared with the actual distances between the nodes.
This can cause the network to operate slowly for users near opposite
ends of the chain.

Daisy chain is also the name of a recent virus hoax.

SEE OUR COMPLETE DEFINITION, WITH HYPERLINKS:
http://searchnetworking.techtarget.com/sDefinition/0,290660,sid7_gci1115470,00.html?track=NL-34&ad=525872

RELATED CONTENT:

Seagate discusses daisy chaining with SCSI.
http://www.seagate.com/support/kb/disc/scsi_interface_cable.html

2nd Wave Technologies discusses daisy chaining with FireWire.
http://www.2ndwave.com/firewire.asp

Sophos describes the Daisy Chain virus hoax.
http://www.sophos.com/virusinfo/hoaxes/daisychain.html

TODAY'S TECH NEWS
......................................................................

UPDATED: ZOTOB EXPLOITS MICROSOFT WINDOWS FLAW | SearchSecurity.com
Security experts are worried by how fast Zotob was developed to
exploit Microsoft Windows' Plug and Play flaw. A more damaging worm
could be launched with equal speed.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1115620,00.html?track=NL-34&ad=525872

EMC CREATES SURVEILLANCE SAN | SearchStorage.com
EMC's Surveillance Analysis and Management Solution (SAMS) allows
youth corrections facilities to search video data on a state-wide
network.
http://searchstorage.techtarget.com/originalContent/0,289142,sid5_gci1115354,00.html?track=NL-34&ad=525872

IBM'S MILLS: WORKPLACE MANAGED CLIENT WILL PUSH LINUX TO DESKTOP |
SearchDomino.com
At LinuxWorld, Steve Mills, IBM's senior VP of Software, said that
IBM's Workplace application framework could play a key role in the
long-discussed move by Linux to the desktop.
http://searchdomino.techtarget.com/originalContent/0,289142,sid4_gci1115376,00.html?track=NL-34&ad=525872

MORE TECH NEWS
Catch up on all the latest IT news!
http://searchtechtarget.techtarget.com/gateway/news?track=NL-34&ad=525872


BRAIN FOOD
......................................................................

SECRET WORD OF THE DAY
This term refers to that very short moment in time during which you
realize that you have pressed the wrong key and deleted hours, days,
or weeks of work. What is it?

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid39_gci213674,00.html?track=NL-34&ad=525872

TODAY'S TRIVIA QUESTION
What is the informal name for Philips and Sony's "Recordable CD
Standard" that was published in 1990?
a. Orange Book
b. Red Book
c. Purple Book

Answer
http://Searchenterpriselinux.techtarget.com/sDefinition/0,,sid39_gci503648,00.html?track=NL-34&ad=525872

IT ALPHABET SOUP
A MUD is an inventively structured social experience on the Internet.
What does MUD stand for?
a. Multi-User Dungeon
b. Many Users Delegate
c. Major Universal Deal

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid39_gci212609,00.html?track=NL-34&ad=525872

LEARNING CENTER: TOP 10 BEST PRACTICES FOR SECURING E-MAIL CLIENTS |
SearchExchange.com
To protect Microsoft Outlook, SearchExchange.com resident spam and
security expert, Richard Luckett, offers this Top 10 list of things
you should do to make your e-mail clients more secure. (User
registration may be required.)
http://searchexchange.techtarget.com/tipLogin/1,294570,sid43,00.html?track=NL-34&ad=525872&NextURL=http%3A//searchexchange.techtarget.com/tip/1%2C289483%2Csid43_gci1114631%2C00.html

ADDITIONS AND UPDATES
......................................................................

placeshifting
http://whatis.techtarget.com/definition/0,289893,sid9_gci1112947,00.html?track=NL-34&ad=525872

VoWLAN
http://searchmobilecomputing.techtarget.com/sDefinition/0,290660,sid40_gci1113876,00.html?track=NL-34&ad=525872

content-addressed storage
http://searchstorage.techtarget.com/sDefinition/0,290660,sid5_gci1113900,00.html?track=NL-34&ad=525872

Cell processor
http://whatis.techtarget.com/definition/0,289893,sid9_gci1113889,00.html?track=NL-34&ad=525872

TKIP
http://searchmobilecomputing.techtarget.com/sDefinition/0,290660,sid40_gci1113988,00.html?track=NL-34&ad=525872

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:lthing@techtarget.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by WhatIs.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Word of the Day":

Go to unsubscribe: http://WhatIs.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=525872&track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494