Glosario KW | KW Glossary


Ontology Design | Diseño de Ontologías

Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  2  3  4  5  6  7  8  9  10  ...  22  (Next)
  ALL

C

Picture of System Administrator

Compliance Audit

by System Administrator - Saturday, 14 March 2015, 1:53 PM
 

Compliance Audit

Posted by Margaret Rouse

A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliancepreparations. Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit.

What, precisely, is examined in a compliance audit will vary depending upon whether an organization is a public or private company, what kind of data it handles and if it transmits or stores sensitive financial data. For instance, SOX requirements mean that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure. Healthcare providers that store or transmit e-health records, like personal health information, are subject to HIPAA requirements. Financial services companies that transmit credit card data are subject to PCI DSSrequirements. In each case, the organization must be able to demonstrate compliance by producing an audit trail, often generated by data from event log management software.

Compliance auditors will generally ask CIOs, CTOs and IT administrators a series of pointed questions over the course of an audit. These may include what users were added and when, who has left the company, whether user IDs were revoked and which IT administrators have access to critical systems. IT administrators prepare for compliance audits using event log managers and robust change management software to allow tracking and documentation authentication and controls in IT systems. The growing category of GRC (governance, risk management and compliance) software enables CIOs to quickly show auditors (and CEOs) that the organization is in compliance and will not be not subject to costly fines or sanctions.

 

Continue Reading About compliance audit

Related Terms

Link: http://searchcompliance.techtarget.com

Picture of System Administrator

Comunicación (KW)

by System Administrator - Thursday, 2 May 2013, 5:11 PM
 

Ejemplo:

“Ahora el seguro médico ACME SA es el más 'seguro' del planeta. Nuestro sistema de información detecta en tiempo real los errores de prescripción y despacho de medicamentos, y le alerta sobre cualquier acción preventiva para evitar potenciales problemas… mejorando su calidad de vida. Esto es así gracias a la integración de 2 millones de componentes desarrollados por el DKW MEDICINE INSTITUTE OF HARVARD UNIVERSITY en el sistema informático de atención primaria, administración hospitalaria y farmacia.”

Ya habíamos presentado un slogan genérico: “Usted… ¡sí!, Usted, es el principal componente tecnológico”.

También hablamos de los tres ámbitos para sembrar la “semilla KW”: universitario, redes sociales y el B2B/B2C tradicional. El primero validará segundo y tercero. Muchas empresas financiarán el desarrollo en el ambiente universitario, creando una nueva cadena de valor que beneficiará a ambos.

Los estudiantes universitarios podrán elaborar sus tesis de grado construyendo contenidos HKW y DKW en vez de escribir sendos documentos que se volverán amarillos y obsoletos en la biblioteca de la Universidad. Las investigaciones en las cátedras serán 100% reusables, generando contenidos “marca registrada” que les prestigiarán y, ¿porqué no?, serán una fuente de ingresos legítimos y universales por derechos de copyright.

El Hogar Digital es un escenario de enorme fertilidad para la tecnología KW, quizás la que más rápido popularice y masifique su uso.

Lo interesante es que, para construir productos “KW Compatible”, los fabricantes utilizarán esta tecnología en sus propias líneas de producción y estrategias comerciales.

Cualquier mensaje “de venta” para la tecnología KW deberá estar centrada en el protagonismo posible que el Usuario Final tendrá con ella. 

Picture of System Administrator

Conformidad (CALIDAD)

by System Administrator - Thursday, 9 May 2013, 1:02 AM
 

CONCEPTOS RELATIVOS A LA CONFORMIDAD

Defecto: Incumplimiento de un requisito asociado a un uso previsto o especificado.

No conformidad: Incumplimiento de un requisito.

Conformidad: Cumplimiento de un requisito.

Liberación: Autorización para proseguir con la siguiente etapa de un proceso.

Acción preventiva: Acción tomada para eliminar la causa de una no conformidad potencial u otra situación potencialmente indeseable.

Acción correctiva: Acción tomada para eliminar la causa de una no conformidad detectada u otra situación indeseable.

Corrección: Acción tomada para eliminar una no conformidad detectada.

Reproceso: Acción tomada sobre un producto no conforme para que cumpla con los requisitos.

Reparación: Acción tomada sobre un producto no conforme para convertirlo en aceptable para su utilización prevista.

Reclasificación: Variación de la clase de un producto no conforme, de tal forma que sea conforme con requisitos que difieren de los iniciales.

Desecho: Acción tomada sobre un producto no conforme para impedir su uso inicialmente previsto.

Concesión: Autorización para utilizar o liberar un producto que no es conforme con los requisitos especificados.

Permiso de desviación: Autorización para apartarse de los requisitos originalmente especificados de un producto antes de su realización.

Picture of System Administrator

Connection Broker

by System Administrator - Monday, 9 March 2015, 3:07 AM
 

5 ways a Connection Broker Simplifies Hosted Environments

With all the moving parts to think about when moving resources into the data center, a connection broker might be the last thing on your mind.

Waiting until you've designed the rest of your data center to consider the connection broker can be detrimental to the overall usability of your system. 

This is why we've created our new eBook, which outlines five scenarios where including a connection broker into your design from the get-go can future-proof and improve your hosted desktop solution.  

Download our new eBook and learn about:

  • Supporting mixed virtual and physical environments
  • Migrating between virtualization and hosted desktop solutions
  • Supporting a wide range of users and use cases
  • And more!

Please read the attached whitepaper

Picture of System Administrator

Consejos para el desarrollo de aplicaciones

by System Administrator - Friday, 24 February 2017, 5:15 PM
 

Consejos para el desarrollo de aplicaciones

El ciclo de vida de desarrollo de aplicaciones es cada vez más corto. ¿Cómo conseguir desarrollos seguros y probados antes de salir a producción?

Las pruebas de software siempre pueden benefi¬ciarse de un enfoque más estructurado. El método científico no es en realidad un conjunto de méto¬dos, sino un conjunto más amplio de principios rectores. Como vera en este contenido, hay muchas similitudes entre los experimentos hechos por científicos y las pruebas de software hechas por desarrolladores.

En este handbook aprenderá sobre:

  1. Como aplicar el método científico en las pruebas de aplicaciones
  2. Los retos que la nube trae para el desarrollo
  3. Pruebas para aplicaciones móviles
  4. Y más

Por favor lea el documento adjunto...

 

Up, Up and Away: Java App Development Heads to the Cloud

Cloud computing has changed the way software is being developed. Learn how smart organizations are using the cloud to save money and make production and security more efficient.

Please read the attached whitepaper...

Picture of System Administrator

Converged Infrastructure

by System Administrator - Monday, 30 November 2015, 5:20 PM
 

Achieve Your IT Vision With Converged Infrastructure

Whether you've already deployed a converged system or have future deployment plans, you can maximize that investment with automation. This paper outlines 4 steps to reduce your IT complexity with converged infrastructure so your team gains the freedom to innovate and drive bottom-line results.

 

Please read the attached whitepaper.

Picture of System Administrator

Converged Infrastructures Deliver the Full Value of Virtualization

by System Administrator - Sunday, 27 December 2015, 3:27 PM
 

Converged Infrastructures Deliver the Full Value of Virtualization

By Ravi Chalaka | Hitachi Data Systems

Satisfied with your virtualization efforts?
You could be.

How does an organization modernize IT and get more out of infrastructure resources? That’s a question many CIOs ask themselves. With hundreds or even thousands of physical hardware resources, increasing complexity and massive data growth, you need new, reliable ways to deliver IT services in an on-demand, flexible and scalable fashion. You also must address requests for faster delivery of business services, competition for resources and trade-offs between IT agility and vendor lock-in.

Please read the attached whitepaper.

Picture of System Administrator

Copyleft (COPYRIGHT)

by System Administrator - Wednesday, 10 July 2013, 7:11 PM
 

Copyleft

Copyleft is the idea and the specific stipulation when distributing software that the user will be able to copy it freely, examine and modify the source code, and redistribute the software to others (free or priced) as long as the redistributed software is also passed along with the copyleft stipulation. The term was originated by Richard Stallman and the Free Software Foundation. Copyleft favors the software user's rights and convenience over the commercial interests of the software makers. It also reflects the belief that freer redistribution and modification of software would encourage users to make improvements to it. ("Free software" is not the same as freeware, which is usually distributed with copyright restrictions.)

Stallman and his adherents do not object to the price or profit aspects of creation and redistribution of software - only to the current restrictions placed on who can use how many copies of the software and how and whether the software can be modified and redistributed.

The de facto collaboration that developed and refined Unix and other collegially-developed programs led the FSF to the idea of "free" software and copyleft. In 1983, the FSF began developing a "free software" project that would both demonstrate the concept while providing value to users. The project was called GNU, an operating system similar to a Unix system. GNU and its various components are currently available and are distributed with copyleft stipulations. Using GNU components, the popular Linux system is also issued with a copyleft.

 
This was last updated in September 2005
Posted by: Margaret Rouse
Picture of System Administrator

Copyright (COPYRIGHT)

by System Administrator - Wednesday, 10 July 2013, 7:12 PM
 

Copyright

Are You Violating Copyright? | Handling of External Links | Work for Hire | Employee Activities
Protecting Your Own Works | How to Stay Legal | Selected Links 

Copyright is the ownership of an intellectual property within the limits prescribed by a particular nation's or international law. In the United States, for example, the copyright law provides that the owner of a property has the exclusive right to print, distribute, and copy the work, and permission must be obtained by anyone else to reuse the work in these ways. Copyright is provided automatically to the author of any original work covered by the law as soon as the work is created. The author does not have to formally register the work, although registration makes the copyright more visible. (See Circular 66, "Copyright Registration for Online Works," from the U.S Copyright Office.) Copyright extends to unpublished as well as published works. The U.S. law extends copyright for 50 years beyond the life of the author. For reviews and certain other purposes, the "fair use" of a work, typically a quotation or paragraph, is allowed without permission of the author.

The Free Software Foundation fosters a new concept called copyleft in which anyone can freely reuse a work as long as they in turn do not try to restrict others from using their reuse.

EditPros, an editing and marketing communications firm, has allowed us to reprint below an article about copyright as it applies to the Internet.

Are You Violating Copyright on the Internet?

The Internet, inarguably one of the most remarkable developments in international communication and information access, is fast becoming a lair of copyright abuse. The notion of freedom of information and the ease of posting, copying and distributing messages on the Internet may have created a false impression that text and graphic materials on World Wide Web sites, postings in "usenet" news groups, and messages distributed through e-mail lists and other electronic channels are exempt from copyright statutes.

In the United States, copyright is a protection provided under title 17 of the U.S. Code, articulated in the 1976 Copyright Act. Copyright of a creative work extends 50 years beyond the lifespan of its author or designer. Works afforded copyright protection include literature, journalistic reports, musical compositions, theatrical scripts, choreography, artistic matter, architectural designs, motion pictures, computer software, multimedia digital creations, and audio and video recordings. Copyright protection encompasses Web page textual content, graphics, design elements, as well as postings on discussion groups. Canada's Intellectual and Industrial Property Law, Great Britain's Copyright, Designs and Patents Act of 1988, and legislation in other countries signatory to the international Berne Convention copyright principles provide similar protections.

Generally speaking, facts may not be copyrighted; but content related to presentation, organization and conclusions derived from facts certainly can be. Never assume that anything is in the "public domain" without a statement to that effect. Here are some copyright issues important to companies, organizations and individuals.

Handling of External Links

Even though links are addresses and are not subject to copyright regulations, problems can arise in their presentation. If your Web site is composed using frames, and linked sites appear as a window within your frame set, you may be creating the deceptive impression that the content of the linked site is yours. Use HTML coding to ensure that linked external sites appear in their own window, clearly distinct from your site. Incidentally, you may wish to disavow responsibility for the content of sites to which you provide links.

Work for Hire

While copyright ordinarily belongs to the author, copyright ownership of works for hire belong to the employer. The U.S. Copyright Act of 1976 provides two definitions of a work for hire: 1. a work prepared by an employee within the scope of his or her employment; or 2. a work specially ordered or commissioned for use as a contribution to a collective work, as a part of a motion picture or other audiovisual work, as a translation, as a supplementary work, as a compilation, as an instructional text, as a test, as answer material for a test, or as an atlas, if the parties expressly agree in a written instrument signed by them that the work shall be considered a work made for hire. U.S. Copyright Office documentation further states, "Copyright in each separate contribution to a periodical or other collective work is distinct from copyright in the collective work as a whole and vests initially with the author of the contribution."

Employee Activities

Just as making bootleg tapes of recorded music and photocopying books are illegal activities, printing and distributing contents of Web pages or discussion group postings may constitute copyright infringement. And companies may be liable for such activities conducted by their employees using company computing or photocopying equipment. However, the law does not necessarily prohibit downloading files or excerpting and quoting materials. The doctrine of fair use preserves your right to reproduce works or portions of works for certain purposes, notably education, analysis and criticism, parody, research and journalistic reporting. The amount of the work excerpted and the implications of your use on the marketability or value of the works are considerations in determining fair use. Works that are not fixed in a tangible form, such as extemporaneous speeches, do not qualify for copyright protection. Titles of works, and improvisational musical or choreographic compositions that have not been annotated, likewise cannot be copyrighted. Names of musical groups, slogans and short phrases may gain protection as trademarks when registered through the U.S. Patent & Trademark Office.

Protecting Your Own Works

Although copyright automatically applies to any creative work you produce, you can strengthen your legal copyright protection by registering works with the U.S. Copyright Office. Doing so establishes an official record of your copyright, and must be done before filing an infringement civil lawsuit in Federal district court. Registration costs $20. For information, visit the Copyright Office Web site or call (202) 707-3000; TTY is (202) 707-6737.

If you appoint an independent Web developer to create and maintain your Web site, make sure through written agreement that you retain the copyright to your Web content.

Place a copyright notice on each of your Web pages and other published materials. Spell out the word "Copyright" or use the encircled "c" symbol, along with the year of publication and your name, as shown in this example:

Copyright 1998 EditPros marketing communications If you're concerned about copyright protection in other nations, add: "All rights reserved."

Along with your copyright notice, include an acceptable use policy, announcing to your readers how they may use the material. You may allow Web visitors, for example, to download and print pages for their own use, but may prohibit them from distributing those materials to others without your permission. You may wish to decline permission to download graphics or sound files that you created.

How to Stay Legal

If you'd like to share the contents of an interesting Web page with your company employees, describe the page and tell them the URL address of the Web site so they can look for themselves. And if the latest edition of a business newspaper contains an article you'd like to distribute to your 12 board members, either ask the publication for permission to make copies, or buy a dozen copies of the newspaper. Retention of value through sales of that newspaper, after all, is what copyright law is intended to protect.

Selected Links

 The United States Copyright Office contains an explanation of American copyright basics and a list of frequently asked questions, as well as the complete text of the United States Copyright Act of 1976. Topics include copyright ownership and transfer, copyright notice, and copyright infringement and remedies. The site is maintained by the U.S. Library of Congress.

 The Copyright Clearance Center is an online resource operated by the Copyright Clearance Center Inc. (CCC), which was formed in 1978 as a not-for-profit organization to induce compliance with the U.S. copyright law. CCC, based in Danvers, MA, provides licensing systems for reproduction and distribution of copyrighted materials throughout the world.

 Circular 66 from the U. S. Copyright Office explains Copyright Registration for Online Works.


Most of the material in this definition/topic was reprinted from an EditPros newsletter with their permission. EditPros is a writing, editing, and publishing management firm in Davis, California with their own Web site. 

 
This was last updated in September 2005
Posted by: Margaret Rouse
Picture of System Administrator

Cowboy Coding

by System Administrator - Wednesday, 21 January 2015, 8:39 PM
 

Cowboy Coding

Posted by Margaret Rouse

Cowboy coding describes an undisciplined approach to software development that allows individual programmers to make up their own rules.

Cowboy coding is programming lingo for an approach tosoftware development that gives programmers almost complete control over the development process. In this context, cowboy is a synonym for maverick -- an independent rebel who makes his own rules. 

An organization might permit cowboy coding because there are not enough resources to commit to the design phase or a project deadline is looming. Sometimes cowboy coding is permitted because of a misguided attempt to stimulate innovation or because communication channels fail and there is little or no business stakeholder involvement or managerial oversight. An individual developer or small team might be given only a minimal description of requirements and no guidance regarding how these objectives should be achieved. They are free to select frameworks, coding languages, libraries, technologies and other build tools as they see fit. 

The cowboy approach to coding typically focuses on quick fixes and getting a working product into production as quickly as possible. There is nodocumentation or formal  process for quality assurance testing, as required by continuous integration and other Agile software developmentmethodologies. Instead of producing lean, well-written code, cowboy code often has errors that cause failures upon deployment or make it difficult to maintain over time. Integrating the various components of the code may also be a challenge since with cowboy coding there are no agreed-upon best practices to provide continuity.

 

Continue Reading About cowboy coding

Link: http://searchsoftwarequality.techtarget.com

Picture of System Administrator

Creating and Testing Your IT Recovery Plan

by System Administrator - Thursday, 8 October 2015, 12:14 PM
 

Creating and Testing Your IT Recovery Plan

Regular tests of your IT disaster recovery plan can mean the difference between a temporary inconvenience or going out of business.

Testing at least once per month is important to maintain engineering best practices, to comply with stringent standards for data protection and recovery, and to gain confidence and peace of mind. In the midst of disaster is not the time to determine the flaws in your backup and recovery system. Backup alone is useless without the ability to efficiently recover, and technologists know all too well that the only path from “ought to work” to “known to work” is through testing.

A recent study found that only 16 percent of companies test their disaster recovery plan each month, with over half testing just once or twice per year, if ever. Adding to the   concern, almost one – third of tests resulted in failure.

The reasons cited for infrequent testing include the usual litany of tight budgets, disruption to employees and customers, interruption of sales and revenue, and of course the scarcity of time. This survey covered mostly large enterprises, and the challenges are even greater for smaller firms. According to the survey findings1
, half of the SMBs that have implemented disaster preparedness plans did so after experiencing an outage and/or data loss. Fifty –two percent put together their plans
with in the last six months. However, only 28percent have actually tested their recovery plans.

Yet new systems have arrived that allow daily automated testing of full recovery, putting such assurances in reach of every business. Backup without rapid recovery and testing will soon be as obsolete as buildings without sprinklers or cars without seatbelts.

Please read the attached whitepaper.

Not Creating a Disaster Recovery Plan Could Cost You Everything

Disaster recovery planning is a very large topic, with just one part being about backing up and recovering your data.  To give you a real life example of what I mean by saying that data backup and recovery is just part of an overall disaster recovery plan, I will refer to a recent posting on Reddit.  The post talks about how the System Admin gets a ticket saying that the power is out in their office in Kiev and that the UPS battery is down to 13%. In response, the technician at the office simply shuts down the gear.  The next day they received a news report that basically stated that the entire building, that was once their Kiev office, was no longer functional as fire and collapsed floors had completely devastated it.  The System Admin ends his post by asking how is your disaster recovery plan, and have you tested it.

When you start thinking about planning out your disaster recovery plan, you need to think about completely unrealistic disasters, along with the normal types of disaster crisis scenarios.  If you have a disaster recovery plan already in place, does it take into account what happens if the office is completely destroyed or is inaccessible?  How about multiple points of connectivity?  When was the last time that your disaster recovery plan was actually tested?

When to Test Your Disaster Recovery Plan

It is a good practice to update and test your disaster recovery plan whenever large changes are made.  What happens when you have everything set the way you want it and nothing huge has changed?  My suggestion is to treat it like your smoke detector; twice a year when the time changes and you change the batteries in your smoke detectors, test your entire disaster recovery plan.  Testing that plan should include asking yourself questions and exploring “what if” scenarios like: what happens if Bob, the main System Admin goes missing or dies by the proverbial bus that hunts down System Admins, or what happens if the building is on fire and everything inside is gone, or what happens if the cloud service you rely on for production/backup/disaster recovery suddenly closes its doors.   All of these things needs to be accounted for along with many other scenarios in order to be able to recover from a disaster and continue running your business.

Not Making Time for Disaster Recovery Could Cost You

It seems like one of the hardest things to do is to make the time to either create or test your disaster recovery plan.  Most of the time it seems like it comes down to time, and not having enough time is the biggest excuse given for not creating or testing a disaster recovery plan.  This issue of time almost always comes down to priorities. When creating or testing your disaster recovery plan is too low on your priority list, it simply never gets done.

One of the best ways to go about pushing up the priority of disaster recovery is simply to think about how much each minute, hour, day, and week of downtime will cost the company.  For instance, say an hour of downtime on the company website costs the company $3000 in lost e-commerce revenue. Now multiply that over hours or even days and your talking about huge potential losses that could have been avoided. Plus, that is not even factoring in the potential revenue loss of new customers who may not even consider your company after not being able to read about your company/products or the negative affect it has on the company image. The costs, even in this small scale disaster scenery, add up quickly.

The reality is, if you think data loss won’t happen to your company think again. 74% of companies have experienced data loss at the workplace and 32% of companies take several days to recover from the loss of data. The scary truth is 16% of companies that experience data loss never recover.  When you think in terms of the potential cost to the company, it should help you prioritize your disaster recovery planning and testing along with justifying the costs of both the planning, infrastructure, and testing.

I think Benjamin Franklin said it best when he stated “If you fail to plan, you plan to fail.” When it comes to disaster recovery, failing to have a plan is a sure-fire way to set the company up for failure in the event of a disaster, and it could cost the company everything.

If you liked this post, subscribe to our RSS feed

Link: http://www.novastor.com

Picture of System Administrator

Creative Commons (COPYRIGHT)

by System Administrator - Wednesday, 10 July 2013, 7:13 PM
 

Creative Commons

Part of the Open source glossary:
 

Creative Commons is a nonprofit organization that offers copyright licenses for digital work. 

No registration is necessary to use the Creative Commons licenses. Instead, content creators select which of the organization's six licenses best meets their goals, then tag their work so that others know under which terms and conditions the work is released. Users can search the CreativeCommons.org website for creative works such as music, videos, academic writing, code or images to use commercially or to modify, adapt or build upon. 

The six categories of licenses offered are: 

  • Attribution - lets others distribute, remix, tweak and build upon work, even commercially, as long as they credit the creator for the original work.
  • Attribution-NoDerivs - allows for commercial and non-commercial redistribution, as long as the work is passed along unchanged and in whole, crediting the creator.
  • Attribution-NonCommercial-ShareAlike - lets others remix, tweak, and build upon work for non-commercial purposes, as long as they credit the creator and license any new creations under the identical terms.
  • Attribution-ShareAlike - lets others remix, tweak, and build upon work for commercial and non-commercial purposes, as long as they credit the creator and license new creations under the identical terms.
  • Attribution-NonCommercial - lets others remix, tweak, and build upon work for non-commercial purposes, crediting the creator.  Derivative works do not have to be licensed under the same terms.
  • Attribution-NonCommercial-NoDerivs - allows others to download work and share it as long as they credit the creator, don't change the work in any way or use it for commercial purposes. 

See alsocopyleftrights reserved

This was last updated in July 2013

Contributor(s): Emily McLaughlin
Posted by: Margaret Rouse
Picture of System Administrator

CRM

by System Administrator - Sunday, 31 March 2013, 7:45 PM
 

Customer Relationship Management

La administración de la relación con los clientes, CRM (Customer Relationship Management), es parte de una estrategia de negocio centrada en el cliente. Una parte fundamental de su idea es, precisamente, la de recopilar la mayor cantidad de información posible sobre ellos y así poder dar valor a la oferta. Esto se refiere a poder brindarles soluciones que se adecuen perfectamente a sus necesidades, sin generarles nuevas. Por lo tanto, el nombre CRM hace referencia a una estrategia de negocio basada principalmente en la satisfacción de los clientes. También se identifican con esta sigla los sistemas informáticos que le dan soporte.

El concepto más cercano es Marketing Relacional. También tiene que ver con: Clienting, Marketing 1x1,Marketing Directo, etc.

Picture of System Administrator

CRM Handbook

by System Administrator - Thursday, 9 July 2015, 4:31 PM
 

 

Please read the attached handbook.

Picture of System Administrator

Crowdsourced Testing

by System Administrator - Wednesday, 29 March 2017, 9:40 PM
 

¿La solución para la rápida entrega de aplicaciones para móviles? Es una prueba de crowdsourcing

Crowdsourced Testing es una plataforma web que conecta empresas especializadas en desarrollo de software y sitios web con una red internacional de profesionales del aseguramiento de calidad (testers) que pueden probar sus productos para encontrar fallas y reportarlas de forma rápida y expedita para facilitar su corrección, donde el cliente son las empresas que pagan por este servicio y el usuario el grupo de testers encargado de las mejoras. Los testers de Crowdsourced Testing son trabajadores independientes que trabajan desde su casa, todos con experiencia previa en aseguramiento de calidad de productos informáticos. 

The solution to speedy mobile app delivery? It's crowdsourced testing

 

Sometimes you just need a lot of users playing with your app to find out how it's really working. Enter crowdsourced testing. It's the latest strategy to speed up your mobile dev.

At a time when the pressure to develop, test and release mobile apps quickly has never been more intense, the idea of crowdsourced testing is growing in popularity. The concept is simple: A crowdsourced testing company can offer thousands of testers in different locations around the world a wide swath of devices, and by literally throwing a "crowd" at the problem, testing that might take weeks with a small internal team can be done on a weekend, said Peter Blair, vice president of marketing at Applause. And it's an idea that has apparently caught hold. According to data from market research firm Gartner Group, there were 30 crowdsourced testing companies operating at the end of last year, offering fully vetted (qualified) testers, up from just 20 companies in 2015.

Priyanka Halder, director of quality assurance at HomeMe, is no stranger to crowdsourced testing. She participated in a number of "bug battles" at uTest, a software testing community that also offers crowdsourced testing opportunities. So when she joined the small startup HomeMe she immediately began thinking about a crowdsourced testing solution. 

"We're a pretty small company and we needed a larger number of people looking at our app and on a tight budget," she said. "This is the perfect model for us because we can't afford a big team on our site."

People just do things that no system, no automation and no engineer could ever predict they'd do." 

Peter Blairvice president of marketing, Applause

With crowdsourced testing it is all about the big team. Blair said Applause has over 250,000 fully vetted testers, most of whom are QA professionals with full-time jobs who do this on the side. These testers are located around the world, and are paired with "pretty much every mobile device you can think of," he said. So a crowdsourced customer wouldn't have to worry about having access to every single version of an Android phone, which Blair said is a huge selling point.

But the biggest issue, he said, is that companies are hungry to see how real users actually interface with their products. "People just do things that no system, no automation and no engineer could ever predict they'd do," he explained. "Customers who've used us just to augment their teams many times end up staying on because they like seeing the results of our exploratory testing," he said, and they can't get that information easily any other way.

Halder said she looked at a number of crowdsourced testing options before settling on Applause. The biggest plus for her was how easy it was to get the testing feedback and how mature the company's process was. "It can be a nightmare to coordinate how to get the information back from the testers. This ended up being a way for us to get more people actually using our app for less money and get all the feedback we need."

 

Next Steps

Link: http://searchsoftwarequality.techtarget.com

 

 

 

Picture of System Administrator

CROWDSOURCING FOR ENTERPRISE IT

by System Administrator - Tuesday, 14 July 2015, 6:45 PM
 

10 KEY QUESTIONS (AND ANSWERS) ON CROWDSOURCING FOR ENTERPRISE IT

A starting guide for augmenting technical teams with crowdsourced design, development and data science talent

A crowdsourcing platform is essentially an open marketplace for technical talent. The requirements, timelines, and economics behind crowdsourced projects are critical to successful outcomes. Varying crowdsourcing communities have an equal variety of payments being offered for open innovation challenges. Crowdsourcing is meritocratic - contributions are rewarded based on value. However, the cost-efficiencies of a crowdsourced model reside in the model's direct access to talent, not in the compensated value for that talent. Fair market value is expected for any work output. The major cost difference with between legacy sourcing models and a crowdsourcing model is (1) the ability to directly tap into technical expertise, and (2) that costs are NOT based around time or effort.

Please read the attached whitepaper.

Picture of System Administrator

Customer Service Model

by System Administrator - Wednesday, 11 November 2015, 12:59 PM
 

Mastering the Modern Customer Service Model

by Wheelhouse Enterprises

Perfecting your in-house customer service system has never been easy until now. The cloud has made customer service tools readily available and revolutionized how they are implemented. Our newest white paper details the tools necessary for the most modern, up-to-date customer service tools for your organization. Whether you're looking for specific tools for your contact center or CRM, we have you covered.

Please read the attached whitepaper.


D

Picture of System Administrator

D (BUSINESS)

by System Administrator - Thursday, 2 May 2013, 9:36 PM
 
Picture of System Administrator

D (DATA CENTER)

by System Administrator - Thursday, 11 July 2013, 5:14 PM
 
Picture of System Administrator

D (ICT/TIC)

by System Administrator - Thursday, 2 May 2013, 7:27 PM
 
Picture of System Administrator

D (MARKETING)

by System Administrator - Thursday, 2 May 2013, 10:15 PM
 

 

D

Data martsData miningData warehouseDatos de carácter personañDe dominio públicoDeclaranteDemoDemowareDenegación de Servicio (DoS)Dependiente virtualDerechos de autorDescargarDestinatario del servicio,Detector de intrusionesDHTMLDialerDialer estafaDiario en LíneaDinero electrónicoDirecciónDirectorioDiseño líquidoDistribuciónDivXDNSDNS spoofingDominioDominio CaducadoDominio de primer nivelDominio de segundo nivelDominio de tercer nivelDot.com.

 

=> Data marts: Palabras inglesas que definen a un Almacén de Datos Especializado. Se trata de una base de datos segmentada para poder atacar mejor cualquier nicho de mercado.

=> Data mining: Palabras inglesas que definen a la Minería de Datos. Especialización informática en el tratamiento y recuperación de información.

=> Data warehouse: Almacén de datos centralizado. Requiere de un software que permite conocer mejor el perfil del cliente y poder dar respuesta a sus necesidades. En este sistema se basan las estrategias del mk1to1.

=> Datos de carácter personañ: Cualquier información concerniente a personas físicas identificadas o identificables, según se expone en la Ley de Protección de Datos de Carácter Personal(LOPD) vigente en España. La consideración es similar a lo expresado por las leyes aplicables en otros países de Europa. Dichos datos pueden ser proporcionados por los usuarios que visitan un sitio web y rellenan algún tipo de formulario.

=> De dominio público: Se trata de un espacio, información o programa disponible para los usuarios de forma gratuita. En inglés, Public domain.

=> Declarante: Persona física que cumplimenta la solicitud de inscripción en la Agencia de Protección de Datos y actúa como mediador entre la Agencia y el titular o responsable del fichero en el que se recogen los datos de carácter personal tal y como indica la Ley de Protección de Datos de Carácter Personal(LOPD). No debe necesariamente coincidir con el titular o responsable, es más puede tratarse de algún profesional o empleado de una firma especializada que, entre otras actividades, se dedique a la adecuación de las empresas a la LOPD.

=> Demo: Abreviatura de demostración. Presentación de una aplicación de pago en Internet mediante una versión que o bien tiene limitadas algunas funciones específicas que suelen las de más valor añadido o bien funciona plenamente durante un periodo limitado que suele ser de unos 30 días. En ambos casos lo que ser persigue es dar a conocer la aplicación al potencial cliente quien de este modo la puede evaluar antes de adquirirla.

=> Demoware: Programa informático que sólo incluye una demostración de algún programa comercial y que suele distribuirse por medio de Internet.

=> Denegación de Servicio (DoS): Se trata de un tipo de ciberataque en el que, en Internet, se priva a un usuario u organización de ciertos servicios que deberían estar disponibles en circunstancias normales. Generalmente consiste en el cese del normal funcionamiento de un servidor web o de correo electrónico. Entre las técnicas que utilizan los mercenarios del marketing en la Red esta de denegación de servicio es una de las más perjudiciales porque logra que un sitio web no pueda ser visto por los que intentan acceder al mismo.

=> Dependiente virtual: Robot de ayuda en algunos sitios web donde hacen comercio electrónico.

=> Derechos de autor: Concepto jurídico empleado para aludir a los derechos que tienen los creadores respecto sus obras literarias y artísticas. La Organización OMPI (Organización Mundial de Propiedad intelectual) administra el Tratado de la OMPI sobre Derecho de Autor y el Tratado de la OMPI sobre Interpretación o Ejecución y Fonogramas (conocidos conjuntamente como "Tratados de Internet"), que establecen normas internacionales destinadas a impedir el acceso no autorizado y la utilización de obras creativas en Internet u otras redes digitales. Para ampliar información se aconseja ver:http://www.wipo.int/spa/disclaimer/disclaim.htm. En Inglés: Copyright.

=> Descargar: Acción de transferir un archivo desde un servidor hasta nuestro ordenador. Como palabra en su acepción inglesa se ha hecho tan popular como que uno de los lugares de más éxito para encontrar programas shareware ofreeware es precisamente: http://www.download.com. Ver bajar. En inglés: download.

=> Destinatario del servicio: Persona física o jurídica que utiliza, sea o no por motivos profesionales, un servicio de la sociedad de la información, según la vigente ley española de Servicios de la Información y de Comercio Electrónico (LSSICE) en vigor desde el 12 de octubre de 2002.

=> Detector de intrusiones: Programa que se instala en un sistema y que tiene como función detectar y alertar cada vez que se produzca un ataque o un intento de entrada ilegal.

=> DHTML: Acrónimo de las palabras inglesas: Dynamic Hyper Text Markup Language. Conjunto nuevo de etiquetas y opciones para HTML, desarrollado por la empresa Microsoft con el objetivo de realizarpáginas web más vistosas y dinámicas. Permite que estas páginas actúen emulando programas o presentaciones multimedia.

=> Dialer: Aplicación informática que sirve para conectar directamente desde un ordenador a un proveedor de acceso a Internet. También se trata de un medio de pago en muchos casos ya que al poder conectar con un número de los tipo 806, permite el cobro por visualizar las zonas reservadas de cierto tipo de sitios web como puedan ser los de p(o)rn(o)grafía o esoterismo, aunque también, de un tiempo a ésta parte, sirve vender logotipos y melodías para teléfonos móviles. Nota: el "(o)" esta puesto adrede para que no catalogen esta palabra algunos sistemas de búsqueda de contenido para webs no relacionados con el que nos ocupa.

=> Dialer estafa: Modalidad de Dialer en la que, aprovechándose del desconocimiento del usuario y sin su consentimiento, le reconfiguran la conexión a Internet para que entren a través del 806 del que ellos se benefician.

=> Diario en Línea: Modo en que, en el español de Estados Unidos, traducen el término weblog. En España se ha optado por usar las palabras: “Bitácora” o “Cuaderno de Bitácora”, ya que “Diario en línea” puede llevar a confundir con las publicaciones periódicas diarias comerciales.

=> Dinero electrónico: Idem: cybercash.

=> Dirección: Si hace referencia a un buzón de correo electrónico equivale a cuenta. Respecto a una página web es lo mismo que la URL.

=> Directorio: Carpeta de archivos almacenados bajo el mismo nombre y que deberían estar relacionados entre sí. Por ejemplo, en una página web, los archivos HTML se guardan en una carpeta, las imágenes en otra, y los programas, en una tercera, a fin de lograr una mejor organización de la arquitectura de la información del sitio web.

=> Diseño líquido: En la creación de una página web, se trata de aquel diseño que se adapta al ancho y alto de la pantalla, es decir, a la resolución.

=> Distribución: En Internet este término se aplica a diferentes utilidades. En el correo electrónico, por ejemplo, hace referencia a la propagación de los mensajes desde el servidor de un usuario a los servidores de los destinatarios. Las listas de correo, o de "distribución" son un sistema según el cual cada mensaje que se envía a una lista es recibido por el resto de usuarios que están suscritos a la misma. Con relación a las tiendas virtuales es el reparto fuera de la Red de las mercancías vendidas a través de Internet. Esta última acepción es la realmente la más importante desde el punto de vista del Marketing en Internet ya que de una buena planificación logística depende la viabilidad del comercio electrónico que se realice desde un sitio web.

=> DivX: Programa de compresión de vídeo que permite que archivos de alta calidad de imagen sean almacenados en alrededor al 15 por ciento de su tamaño original. Se trata de un codec estándar paralelo al Mpeg4 de compresión de vídeo que combina con la comprensión del mp3 de audio. Fue desarrollado en 1999 por el francés Jerome Rota, Gej, en la Red. El nombre DivX hace referencia irónica a un formato de discos de vídeo que no logró hacerse un hueco en el mercado digital. Más información en: http://www.mydivx.com.

=> DNS: Siglas de las palabras inglesas:Domain Names Service que, en español, significa: Sistema de Nombres de Dominio. Método de conversión de los dominio, en Internet, a direcciones ip que pueden ser identificadas por los ordenadores. Por ejemplo, la http://www.upv.estiene como IP: 212.231.114.1. El sistema de nombres de Internet depende la IANA (http://www.iana.com). Los identificadores de dominio DNS que corresponden a cada país se recogen en el estándar ISO 3166.

=> DNS spoofing: Acción de apropiarse ilegalmente y por la fuerza de un dominio ajeno.

=> Dominio: Nombre mediante el cual una empresa u organización se da a conocer en Internet . Puede basarse en el nombre de la empresa o en una de sus marcas. Un curioso ejemplo sería la compañía Cándido Miro, S.L. de Alicante, España, que en la Red se puede encontrar con mayor facilidad cómo: http://www.serpis.com, puesto que Serpis es la marca principal que comercializa esa sociedad. Antes de registrar un dominio puede resultar muy útil comprobar cuantos existen ya con la palabra deseada. Para lo anterior puede ser de gran ayuda el buscador de dominios que se encuentra en:http://www.whois.net. El dominio en rigor técnico equivaldría a la suma del dominio de Segundo Nivel y del dominio de Primer Nivel. Hay empresas de Marketing e Internet cómo Latencia SL que ofrecen entre sus servicios el de registro de los dominios.

=> Dominio Caducado: Dominio que en su día fue registrado pero que pasado un plazo de tiempo (mínimo de un año) no se renovó. Dicho dominio vuelve a estar disponible para el público en general. Normalmente, las grandes empresas registradoras de dominios publican a diario las listas de caducados ya que ahí pueden encontrarse algunas interesantes oportunidades de dominios que, por diversas circunstancias, han ido quedando libres.

=> Dominio de primer nivel: En el Sistema de Nombres de Dominios ( DNS), es el principal nivel jerárquico. Es la parte que se queda más a la derecha en una dirección de Internet. En:http://www.viapublica.com, sería el "com", en: http://www.map.es, sería :".es". Hay dominios de dos tipos, los denominados dominios genéricos (com, net, org) y los dominios territoriales asociados a países. En inglés, Top-Level Domain (TLD).

=> Dominio de segundo nivel: Aquel nombre que va inmediatamente a la izquierda del Dominio de Primer Nivel. En: "mixmarketing-online.com", sería "mixmarketing-online". Es el más importante en el Mix de Marketing Online.

=> Dominio de tercer nivel: En el sistema de nombres de dominio es la jerarquía que viene a continuación de los Dominios de Segundo Nivel. Dicho de otro modo: es la parte de un dominio que viene dos posiciones mas a la izquierda de un Dominio de Primer Nivel. Por ejemplo, en: http://b2b.lladro.com , "b2b" sería el nombre de dominio de Tercer Nivel. Desde el punto de vista del Mix de Marketing Online es muy importante porque sirve para presentar en la Red las diferentes familias de productos que fabrica una determinada empresa o dar acceso, como en el ejemplo anteriormente indicado a una zona para distribuidores. En inglés, Third Level Domain.

=> Dot.com: Forma de nombrar a aquellas empresas nacidas al amparo de Internet y que se basan en la plataforma Web como principal medio de comunicación e interactuación con el público objetivo.

Picture of System Administrator

D (OPEN SOURCE)

by System Administrator - Wednesday, 10 July 2013, 7:19 PM
 
  • Darwin - Darwin is the basic "core" of OS X, the operating system for Appl...
  • database-agnostic - Database-agnostic is a term describing the ...
  • Debian - Debian is a popular and freely-available computer operating syste...
  • Debian Linux - Debian is a popular and freely-available computer ope...
  • Distributed Replicated Block Device - DRBD (D...
  • DMOZ - The Open Directory Project (ODP) is a human-edited index of Web sites...
  • DRBD - DRBD (Distributed Replicated Block Device) is a Linux-based software ...
  • DRBD (Distributed Replicated Block Device)
  • Drizzle - Drizzle is a lightweight open source database management system...
  • Drupal - Drupal is free, open source software that can be used by individu...
Picture of System Administrator

D (PMI)

by System Administrator - Thursday, 9 May 2013, 2:16 AM
 
  • Dependency in a project network is a link amongst a project's terminal elements.
  • Dynamic Systems Development Method (DSDM) is a software development methodology originally based upon the Rapid Application Development methodology. DSDM is an iterative and incremental approach that emphasizes continuous user involvement.
  • Duration of a project's terminal element is the number of calendar periods it takes from the time the execution of element starts to the moment it is completed.
  • Deliverable A contractually required work product, produced and delivered to a required state. A deliverable may be a document, hardware, software or other tangible product.

----------------------------------

  • Declaración de trabajo: Es una herramienta clave de gobernabilidad para dirigir el trabajo de un proveedor o contratista. También se utiliza en la gestión del trabajo interno. Es considerada la Biblia para el trabajo que el proyecto debe producir.
  • Defecto: Una imperfección o deficiencia en algún componente en un proyecto, que hace que dicho componente no cumpla con los requisitos, criterios o especificaciones establecidos de antemano, y que deba ser restaurado o reemplazado.
  • Delphi: Es una técnica para recolectar información que se usar como procedimiento para alcanzar el convenio de expertos en un tema.
  • Desarrollo del Plan de Proyecto: Es tomar los resultados de los otros procesos de planeación y colocarlos un solo documento consistente y coherente.
  • Desarrollo de la Programación: Análisis de  la secuencia de actividades, duración de actividades, y los requerimientos de recursos para crear la programación del proyecto.
  • Desarrollo de Equipo: El desarrollo de las  habilidades de grupo o individuales para el mejoramiento del desempeño del proyecto.
  • Desarrollo Incremental: Es un proceso bajo el cual se produce una aplicación parcial y poco a poco se aumenta la funcionalidad o el rendimiento planificación con anterioridad a través de mediante incrementos subsecuentes.
  • Desarrollo en cascada: Es un enfoque metodológico caracterizado por ordenar de manera rigurosa las etapas del ciclo de vida del software, en donde el comienzo de cada etapa debe esperar a la finalización de la inmediatamente anterior.
  • Descomposición: Técnica de planificación que subdivide tanto el alcance del proyecto como los entregables del proyecto en componentes más pequeños, haciendo más fácil su manejo mientras que así el proyecto se define con suficiente detalle para que todas la tareas pertinentes estén contempladas durante la ejecución, el seguimiento y el control de los trabajos.
  • Descripción de Actividad (DA): Frase breve que se usa en un diagrama de red de proyecto. La descripción de actividad describe también  el alcance de la actividad.
  • Deslizamiento: Es cuando se comienza a sobrepasar el tiempo o el presupuesto ligeramente, lo que genera controles de cambio y que de no atenderse oportuna y seriamente podría derivar en un duro impacto sobre el proyecto.
  • Diagrama de control: Es una forma gráfica de representar datos del proceso en un periodo determinado comparándolo con términos de control establecidos. Este tipo de imágenes poseen una línea central que permite detectar una propensión de lo valores trazados contra cualquiera de los términos de control.
  • Diagrama de flujo: Son esquematizaciones gráficas que emplean símbolos para representar los pasos o las etapas, así como las interacciones entre éstas dentro de un proceso.
  • Diagrama de Gantt: Es una matriz de doble entrada en la cual se anotan en las filas, las distintas actividades que componen un programa o proyecto, mientras que en las columnas se coloca el tiempo en el cual se desarrollarán las tareas. Es una herramienta útil para idetificar fácilmente las actividades y los tiempos de duración de éstas dentro de un proyecto, lo que permite visualizar cómo debe ir avanzando éste.
  • Diagrama de influencias: Es la representación gráfica de situaciones que muestran las influencias casuales, la cronología de eventos y demás relaciones entre las variables y los resulstados.
  • Diagrama de Pareto: Histograma, ordenado por frecuencia de ocurrencia, que muestra cuantos resultados fueron generados por cada causa identificable.
  • Diagrama de Red del Cronograma del Proyecto: Es la representación en forma de esquema de las relaciones lógicas que hay entre las actividades que aparecen en el cronograma del proyecto.
  • Diagrama de red del proyecto: Cualquier representación esquemática de las relaciones lógicas de las actividades del proyecto. Siempre se dibuja de izquierda a derecha para reflejar de manera correcta la cronología del proyecto. Muchas veces se le conoce de forma inapropiada como "gráfica PERT".
  • Diagrama RACI: Es una matriz de todas las actividades o toma de decisiones de las autoridades en una organización contrapuestas con todas las personas y roles. En cada intersección de la actividad y el rol es posible asignar a alguien como Encargado, Responsable, Consultado o Informado para determinada actividad o decisión.
  • Director del proyecto: La persona designada por la organización ejecutante para conducir y alcanzar los objetivos del proyecto.
  • Disparador: Es una señal de que ha sucedido o está por suceder un riesgo.
  • Distribuir información: Es un proceso a través del cual se da a conocer información importante del proyecto a los stakeholders.
  • Documentos de adquisiciones: Son aquellos usados en las actividades de ofrecimiento y propuesta. Estos documentos son los siguientes: Invitación a licitación del comprador; Invitación a negociar; Solicitud de información; Solicitud de Presupuesto; Solicitud de propuesta y respuestas del vendedor.
  • Duración (DU): Es el  tiempo de trabajo (sin incluir días festivos u otros periodos de no trabajo) que se requieren para completar una actividad u otro elemento del proyecto. Se expresa generalmente días, semanas, meses etc.
  • Duración Remanente (RDU): Tiempo  que se necesita para  terminar una actividad.
Picture of System Administrator

D (PROGRAMMING)

by System Administrator - Thursday, 11 July 2013, 5:59 PM
 
Picture of System Administrator

D (Storage)

by System Administrator - Friday, 31 May 2013, 10:37 PM
 
Picture of System Administrator

D (WEB SERVICES)

by System Administrator - Saturday, 1 June 2013, 3:11 PM
 
  • DIME (Direct Internet Message Encapsulation) - a specification that defines a format for attaching files to Simple Object Access Protocol (SOAP) messages between application programs over the Internet. DIME is similar to but somewhat simpler than the Internet's MIME protocol.
  • Document Object Model (DOM) - a programming interface from the W3C that lets a programmer create and modify HTML pages and XML documents as full-fledged program objects.
  • DSML (Directory Services Markup Language) - an XML application that enables different computer network directory formats to be expressed in a common format and shared by different directory systems.
  • DXL (Domino Extensible Language) - a specific version of Extensible Markup Language (XML) for Lotus Domino data.
  • DirXML - Novell's directory interchange software that uses XML to keep different directories synchronized.
Picture of System Administrator

D - Vocabulario Popular Montevideano

by System Administrator - Tuesday, 12 January 2016, 2:11 PM
 

MONTEVIDEANOS EN POCAS PALABRAS
(APROXIMACIÓN A NUESTRO LENGUAJE POPULAR)

- D -

  • DADO/A- Persona muy afectuosa y amigable con la que es muy fácil entablar una relación cordial.
  • DANDY- Tipo que cuida mucho su aspecto, tratando de vestir siempre elegantemente y que muchas veces sólo resulta ser una persona superficial en busca de destacarse de las demás.
  • DAR ABASTO- Poder cumplir con algo sin problemas. Tener tiempo y fuerzas suficientes.
  • DAR BOLA- Prestar atención/Dar más importancia de la que tiene.
  • DAR BOLILLA- Dar bola.
  • DAR BOMBA- Fornicar.
  • DAR CHANGÜÍ- Ver: Changüí.
  • DAR COMO ADENTRO DE UN GORRO- Ver: Dar como en bolsa.
  • DAR COMO EN BOLSA- Propinar una feroz paliza a alguien/Castigar.
  • DAR DE LA QUE PICA- Dar bola/Dar pelota.
  • DAR EL BATACAZO- Ver: Batacazo.
  • DAR EL BRAZO A TORCER- Aceptar una equivocación/Reconocer un error.
  • DAR EL CAMPANAZO- Ver: Batacazo.
  • DAR EL DULCE- Engolosinar a alguien con ciertas artimañas para lograr algo que se está buscando de ella.
  • DAR EL PESTO- Ver: Pesto.
  • DAR EN EL CLAVO- Acertar-Embocar/Dar con la clave de algo.
  • DAR GUASCA- Castigar/Usar en demasía/Fornicar.
  • DAR LA BIABA- Propinar una paliza/Darse la biaba: Acicalarse en demasía.
  • DAR LAS DOCE ANTES DE HORA- Se suele decir de la mujer o el hombre muy atractivo/Algo que está más que a punto.
  • DARLE CON UN CAÑO- Con todo/Sin lástima.
  • DARLE DE PUNTA- Darle con un caño.
  • DARLE PA’ TABACO- Reprender o castigar severamente/Suele decirse también respecto a la relación sexual: "Fulanita le dio pa’ tabaco a fulanito...".
  • DARLE PA’ TABACO, HOJILLA Y FÓSFOROS- Lo mismo que la definición anterior, pero más abundante.
  • DARLO POR HECHO- Confiar plenamente en algo que se promete.
  • DARLO POR PERDIDO- Abandonar toda esperanza respecto a algo.
  • DAR MANIJA- Incitar/Alentar a otro para que lleve a cabo cierta cosa.
  • DAR PELOTA- Dar de la que pica.
  • DARSENERO- Simpatizante del Club Atlético River Plate.
  • DAR SIN LÁSTIMA- Propinar una paliza ferozmente/Hacer algo sin ningún tipo de miramientos con respecto a los demás.
  • DAR UNA MANO- Prestar ayuda.
  • DAR UNA MOVIDA- Propinar un castigo.
  • DÁTILES- Dedos.
  • DAVI- Vida.
  • DE A DOS POR EL PASILLO- Indicación del guarda del transporte colectivo para que los pasajeros que van de pie se ubiquen en doble fila permitiendo hacer lugar para que suban otros.
  • DE A PUCHITO- De a poco/Lentamente/En pequeñas cuotas.
  • DE APURO- Rápida e imprevistamente/Sin previo aviso.
  • DE ARCO A ARCO- Juego de los botijas a la pelota entre dos, tirándose el balón uno al otro.
  • DE ARACA- Quedarse sin lograr el propósito buscado. "Lo dejó de araca y se mandó a mudar..."
  • DE ARRIBA- Obtener algo sin gastos propios. De garrón.
  • DE ARRIBOIDE- De arriba.
  • DE BIÓGRAFO- Poco creíble.
  • DEBUTAR- Iniciarse en algo/Generalmente el término se utiliza para la primera experiencia sexual.
  • DEBUTE- Bien, muy bien. Situación inmejorable.
  • DECA- Decadencia.
  • DE CABEZA- Golpear la pelota en el fútbol con la cabeza/Tener a alguien de cabeza: Tenerlo enganchado, subyugado.
  • DECADENTE- Decrépito/Terminado/En bancarrota.
  • DE CAJÓN- ¡Por supuesto!/Lógico.
  • DE COLOR- Eufemismo para referirse a las personas de raza negra.
  • DE COTELETE- De costado/Accidentalmente/De casualidad.
  • DEDAZO- Designar a alguien "a dedo", sin tener en cuenta la opinión de los demás ni siquiera si reunía los méritos para ello.
  • DE DORAPA- Ver: De parado.
  • DEGOLLAR- Cortarle el cuello a alguien/Estafar/Engañar/Abusar.
  • DE GOLPE Y PORRAZO- Sorpresivamente/Cuando nadie lo esperaba.
  • DEJADEZ- Abandono-Decadencia.
  • DEJADO- Abandonado-Decadente.
  • DEJARLA AHÍ NOMÁS- Dar algo por suficientemente discutido. Punto final.
  • DEJARLO SECO- Timar a alguien y sacarle hasta el último peso/Propinar un golpe con suficiente fuerza como para inmovilizar al rival.
  • DEJAR COLGADO- Abandonar sin muchas explicaciones.
  • DEJAR CORRER LA BOLA- No preocuparse en detener los rumores.
  • DEJAR LA VIDA- Hacer un sacrificio supremo.
  • ¡DEJALO PASTAR QUE ENGORDE...!- Permitir que alguien se engolosine en algo que está haciendo para ajustarle cuentas luego.
  • ¡DEJATE DE EMBROMAR!- No molestes más.
  • DEJATE DE JODER- Lo mismo que el término anterior pero dicho más groseramente y en forma más violenta.
  • DEJÓ UN PUEBLO ADENTRO- Se refiere a alguien que estafó a muchas personas, o quedó debiendo cuentas a unos y a otros, imposibles de cobrárselas.
  • DEL TIEMPO DE MARÍA CASTAÑA- Ver: Del tiempo 'el ñaupa.
  • DEL TIEMPO ‘EL ÑAUPA- Cosa muy antigua.
  • DEL OTRO CUADRO- Afeminado.
  • DEL OTRO LADO- "Pasarlo para el otro lado" se dice cuando se produce un homicidio/Suele decirse también de aquella persona que por un golpe de fortuna salió de la miseria.
  • DE MALA BEBIDA- Individuo al que la ingestión de bebidas alcohólicas lo convierte en una persona belicosa.
  • DE MALA GANA- Hacer algo sin entusiasmo/A regañadientes.
  • DE MALA LECHE- De malos sentimientos-Poco confiable.
  • DE MENTIRA- En broma/Simular una situación para engañar a alguien o simplemente para divertirse.
  • DE MI FLOR- Algo excelente, muy bueno/Así dicen los jugadores de truco cuando cantan flor, jugando una carta: "A mi juego me llamaron / y aunque yo no soy doctor / pa’ curarlos he traído / un remedio de mi flor".
  • DENTRE- Tantear buscando la oportunidad en el juego/Buscar la posibilidad del triunfo/Suma de dinero que debe pagarse para anotarse en algo.
  • DE OJITO- Apostar de afuera, sin pagar la apuesta/Conquista amorosa que solo se expresa con la mirada de ambos enamorados sin que ninguno de los dos se anime a tomar la iniciativa.
  • DE PARADO- De pie, generalmente a las apuradas, referido a una relación sexual.
  • DE PEDO- Casualidad/Suerte.
  • DE PELÍCULA- Buenísimo/Increíble.
  • DEPTO- (Porteñismo adoptado). Bulín.
  • DE PREPO- Prepotentemente.
  • DE PURO CULO- De pura suerte.
  • DE RAMBUYÉ- Término popularizado por Alberto Kesmann, relator de partidos de fútbol, para indicar una forma especial de patear la pelota. Aunque nadie sabe exactamente de qué forma se trata, popularmente se dice que algo se hace de "rambuyé" cuando se hace bien y acertadamente.
  • DERECHO- Individuo honesto, recto y cumplidor/Persona que cumple con su palabra y no acepta ni hace trampas.
  • DERECHO VIEJO- Francamente/Sin subterfugios ni rodeos/De frente.
  • DE RECHUPETE- A pedir de boca/ A punto.
  • DERRETIDO/A- Metejón por alguien del sexo opuesto que no se disimula/Acaramelado/Empalagoso.
  • DERRETIRSE- Acaramelarse/Metejonearse.
  • DESATARSE- Liberarse de los prejucios y las inhibiciones/Tirar la chancleta.
  • DESAYUNAR- Avivar a alguien/Informar de algo que el otro no sabía.
  • DESAYUNARSE- Enterarse tardíamente de algo muy importante.
  • DESBANCAR- Sacarle la mujer a otro/Suplantar a alguien.
  • DESCANGAYADO/A- Roto-Maltrecho-En muy mal estado/Persona de juicio escaso.
  • DESCARRILARSE- Salirse de la buena senda/Incurrir en actos fuera de lugar.
  • DESCAROZAR- Ver: Desvirgar.
  • DESCHAVADO- Muy conocido/Individuo del cual todos conocen sus malos hábitos.
  • DESCHAVARSE- Descubrirse/Mostrar la hilacha/Dejar de disimular para demostrar su verdadera personalidad o sus verdaderas intenciones.
  • DESCHAVE- Delación/Mostrarse tal cual se es sin inhibiciones ni tapujos.
  • DESCHAVETADO- Dícese de quien ha perdido el control de sí mismo. Enloquecido. Fuera de sí.
  • DESCONCHE- Lío/Alboroto/Gran joda.
  • DESCUAJARINGADO-DESCUAJERINGADO- Roto/Descompuesto/Deshecho.
  • DESEMBUCHAR- Confesar-Decir todo lo que no se había querido dar a conocer hasta ese momento.
  • DESGRACIARSE- Matar a alguien en una riña sin tener intención de hacerlo/Tirarse un pedo.
  • DESOREJADO/A- Desfachatado.
  • DESPACHADO/A- Liquidado.
  • DESPACHAR- Liquidar.
  • DESPACHARSE- Sacarse el gusto/Hacer algo o decir cosas que hace mucho tiempo tenía ganas de realizar o confesar.
  • DESPATARRADO/A- Caído abruptamente/Tirado en forma grosera/Abandonado.
  • DESPATARRARSE- Caer groseramente/Abandonarse.
  • DESPATARRO- Desorden/Lío.
  • DESPELOTADO- Desenfrenado-Desnudo.
  • DESPELOTE- Desenfreno-Alboroto/Lío mayúsculo-Enredo.
  • DESPIPORRE- Bulla/Lío/Alboroto.
  • DESTORNILLARSE- Perder la cabeza/Perder el juicio/"Destornillarse de risa": Enloquecer riendo.
  • DESVIRGAR- Iniciar sexualmente a alguien.
  • DE UN SAQUE- De primera/Rápidamente/Al primer intento.
  • DE UPA- De arriba.
  • DIEZ Y DIEZ- Se le llama así a ciertas personas con los pies "a lo Chaplín", es decir, torcidos de tal forma que siempre parecen estar indicando las diez y diez del reloj.
  • ¡DIFÍCIL PARA ESCORPIO!- Algo que tiene pocas posibilidades de lograrse.
  • DIFICILONGO- Difícil.
  • ¡DIGA, CHE...!- Forma muy poco elegante de llamar la atención de alguien.
  • DIMES Y DIRETES- Chismes.
  • DIOME- Medio.
  • ¡DIOS MÍO!- Expresión que se dice ante una situación preocupante.
  • ¡DIOS ME LIBRE Y GUARDE!- Era común, principalmente ante los más viejos, expresarse de esta forma y hacerse la cruz simultáneamente al ver a otra persona enferma, lisiada o con alguna deformación.
  • DIQUE- Compadrada/Aparentar.
  • DIQUERO/A- Compadre-Persona que trata de aparentar lo que no es.
  • DOBLAR EL CODO- Llegar a una edad en que ya se empieza a ser veterano/Acecarse a la meta.
  • DOBLETE- Doble.
  • DOGO- Dogomar Martínez. Uno de los más grandes de la historia del boxeo uruguayo.
  • DOGOR- Gordo.
  • DOLCHE FAR NIENTE- Vivir sin hacer nada, dándose la gran vida.
  • DOLOROSA- Cuenta para pagar/ "A ver, mozo... tráigame la dolorosa".
  • DOMINGO SIETE- Exabrupto/"¡Ya tuvo éste que salirme con un domingo siete!".
  • DON- Señor.
  • ¿DÓNDE ESTÁS MATEO QUE NO TE VEO...?- Reclamación con tono humorístico de alguien que está en una rueda de mate y a quien no le llega el suyo desde hace rato.
  • DON JUAN- Individuo que está siempre en plan de conquistas amorosas.
  • DON NADIE- Intrascendente.
  • DON PAULINO- Especie de santo laico de los jubilados. Don Paulino González fue un gran luchador por los derechos de los ancianos y creó una fundación que aún hoy sigue en actividad.
  • DON PEPE- Respetuosamente se recuerda con este apodo a don Pepe Batlle (José Batlle y Ordoñez, ex presidente de la República) y a don Pepe Artigas (don José Gervasio Artigas, heróe máximo de nuestra lucha revolucionaria por la libertad y la dignidad).
  • DOÑA- Señora.
  • DORAR LA PÍLDORA- Halagar astutamente para luego embaucar a alguien.
  • DORIMA- Marido.
  • DORMIDA- Mujer de pocas luces/Tarifa especial por pasar toda la noche en un amoblado/ "La dormida" sale más barato que pagar por horas.
  • DORMIDO- Individuo perezoso, abúlico/Lento para entender.
  • DOS COBRES- "No vale dos cobres", se refiere a persona o cosa de muy poco valor o importancia.
  • DOS DE ORO- Ojos grandes.
  • DOS POR TRES- De vez en cuando-Humorísticamente se suele decir: ¡Dos por tres...llueve...!.
  • DRAGÓN/A- Enamorado que aún no ha concretado su conquista.
  • DRAGONEAR- Demostrar a una persona del sexo opuesto su interés con gestos, miradas y otras insinuaciones/Desear una cosa observándola con sumo interés.
  • DULCE- Se dice de alguien muy tierno y cariñoso: "Fulanito es un dulce..."/Otra acepción: Ver: Dar el dulce.
  • DURO COMO UNA PIEDRA- Duro como piedra- Se refiere al individuo imposible de enternecer o incapaz de demostrar cariño/ Se refiere también a quien enfrenta las situaciones más difíciles sin temores ni titubeos.

Link: http://www.mec.gub.uy/academiadeletras/Boletines/02/martinez4.htm

Picture of System Administrator

DaaS (CLOUD)

by System Administrator - Wednesday, 5 June 2013, 6:49 PM
 

Para cualquier organización es esencial contar con una buena gestión de sus dispositivos. Las tendencias como el Bring your own device (BYOD) y la consumerización IT también ayudan a que estos servicios tomen impulso. En este contexto, las soluciones DaaS posibilitan la gestión de servicios de las PCs de una forma segura con costos reducidos. No está de más recordar que este sistema ofrece portabilidad para que pueda ser administrado desde cualquier lugar y equipo. 

En definitiva, con DaaS pueden ahorrar costos operacionales ya que se reduce la administración del hardware y se descentraliza la gestión. Además, la empresa será más móvil, rápida en gestionar equipos y, por ende, se volverá más productiva.

Picture of System Administrator

Dan Bricklin: Spreadsheet Inventor on a Life in Computing

by System Administrator - Friday, 29 August 2014, 8:32 PM
 

 

Spreadsheet Inventor Dan Bricklin on a Life in Computing

 Posted by Martin Veitch 

If you use spreadsheets — and today the number of users that do so must be in the hundreds of millions — then every time you open a new workbook, edit a cell or calculate a formula, you can thank Dan Bricklin’s legacy. Bricklin, an MIT graduate and Harvard MBA, developed VisiCalc with Bob Frankston back in 1979. The program not only gave rise to many of the elements of modern spreadsheet programs, selling over a million copies along the way, but, after its 1981 port, also helped the IBM Personal Computer become one of the most important new products of the 20thcentury.

Recently I spoke to Bricklin by phone about VisiCalc, its legacy, the rise of the PC generation and what’s happened since.

First, I asked him to sketch a picture of financial management as it was when he wrote the code for what would become VisiCalc.

“For hundreds of years, financial stuff was done on pen and paper and frequently on columns and rows with labels around them. [In the 1970s] we’d be doing it on paper or typing up things. That’s how you kept your books. When they talked about book-keeping, it was exactly that: there were pages in books. Our first name for VisiCalc was Calcu-ledger because that helped explain what we were doing: providing calculations for general ledger.”

Although the spreadsheet made his name, Bricklin had been largely concentrating on another software category that was to change the way the world worked.

“My background was in word processing but, back then, computerised printing of letters was mostly used in things like fundraising where you’d print one letter hundreds of times. The idea of using that equipment for a plain old letter by a typist… they were just too expensive. The idea of a screen-based word processor was a new thing when I was working in the Seventies at Digital Equipment Corporation (DEC) but I had been exposed to systems like [drawing program] Sketchpad which were interactive programs that had started to become popular in the Sixties and Seventies in research institutions. Computers were becoming important in newspapers so a reporter could type something in and see what it would look like but [for the majority of people] the idea of using a computer to do these things was new.”

When Bricklin prototyped VisiCalc, he showed it to his Harvard professor who told him that his competition was calculating on the back of an envelope; if VisiCalc wasn’t faster, people would never use it. That notion helped make Bricklin a pioneer in another way: delivering a user experience (even before the term had been coined) that was intuitive so a new computer user would understand the new electronic tools. So, VisiCalc looked like a ledger book. Similarly, in word processing, manual tools like scissors and glue became ‘cut’ and ‘paste’ features. Add in extra automation capabilities such as having words automatically wrap around lines of text and you had something that was revolutionary, in the days before even Wang and WordStar automated office tasks.

But at the time, computers were rare, pricey and lacking a standard.

“A person being able to buy a computer in a Radio Shack store was a new thing in the Seventies. The only connection most people had to a computer was using automated teller machines. Timesharing with a terminal where you all shared this remote computer was being developed in the Sixties and started to become popular in the Seventies. People were starting to do financial forecasting but that would cost thousands of dollars a month, plus you’d need terminals. For sizeable companies doing MRP [manufacturing resource planning] that was reasonable, but it would cost $5,000 to $10,000 each for a word processing system of letter quality.”

That pioneer environment explains why Bricklin had no great expectations for commercial success with VisiCalc but he was driven by an idea.

“I came from the word processing world and in this What-You-See-Is-What-You-Get world I’d seen a mouse and was familiar with interactive systems. I think it’d seen an Alto [early Xerox computer], played Space War [a game for the DEC PDP-1], seen Sketchpad, knew APL and Basic. The idea of having what we did with words and numbers on paper but with computation seemed pretty obvious; if there was a ‘eureka’ moment, that was it.

“But I was in word processing and did word processing take off like crazy? No. Was it on every desk? No. Today, people hardly know how to write [in longhand] but in those days the idea that computers would be cheap enough... We knew what should be but we also knew from hindsight that acceptance was very slow. I had seen the mouse in the 1970s, it was invented before that and didn’t come into acceptance until the 80s. So although we had something we saw was wonderful, we had no expectations.”

With the benefit of hindsight though, grass shoots and signs were discernible.

“There were people making money out of software. [Mainframe database maker] Cullinane was the first pre-packaged software company to go public so we knew it was possible. But on the PC there were no [commercial] models. Almost nobody knew who Bill Gates was and he was maybe making a few million dollars a year.”

Also, the economics of the day were very different as an Apple II “fully loaded” with daisywheel printer and screen cost about $5,000, the equivalent of about $18,000 today.

This was also a time of scepticism about personal computing with the leading IT suppliers considering it a fad for hobbyists rather than a big opportunity to sell to business users. This attitude was underlined when Bricklin says he considered putting VisiCalc on DEC’s PDP-11 microcomputer before deciding on the Apple II.

“I was thinking about it but the sales person wasn’t very aggressive. It was classical Innovator’s Dilemma. [DEC CEO] Ken Olsen saw PCs as wheelbarrows when he was selling pickup trucks.”

That sort of attitude was unlikely to change Bricklin’s desire to set up his own company with Frankston rather than market his idea to the computing giants of the time.

“I wanted to start a business and be an entrepreneur,” he recalls. “I had taken a few classes at Harvard; there weren’t many in those days but I took those that were on offer.”

Although VisiCalc is sometimes presented as a smash hit that immediately launched the IBM PC, that notion is wrong on three points. VisiCalc was released on the Apple II in 1979, there were other ports before it was made available on the IBM PC, and the initial reaction from the wider world was lukewarm.

“When it first came out, almost nobody but a few people in the computer press wrote about it. There was a humorous article about the National Computer Conference [scene of the VisiCalc launch] in the New York Times where the VisiCalc name was considered funny and the author was making fun of all the computer terms. It then appeared in an announcement about my wedding in the Fall and my father-in-law was able to put some wording in about me being the creator of VisiCalc…

“We had ‘serious volume’ of 1,000 units per month for the first year. That’s nothing, that’s how many copies of a program are downloaded onto iPads every day, or every minute.”

But by comparison to other business software for the personal computer, VisiCalc was a success and the most clued-in sales people at resellers used it to show what personal computers could do.

“They knew that by demonstrating VisiCalc they could sell a PC… it was a killer app. People at HP got it too. One of my classmates at business school worked there and was making a small desktop computer that ran Basic and his boss put VisiCalc on that. Tandy started advertising about VisiCalc and sales started doing a lot better. By the time the IBM PC came out it was understood that it was a good thing and people in the business press started to say ‘can it run VisiCalc?’”

If the laurels are to Bricklin and Frankston for creating the modern spreadsheet from the confluence of the rise in microcomputers, business interest and new software development languages, it was another program and company that cashed in on the full flowering of those trends.

“When Lotus 1-2-3 came out [in 1983], the moon and stars were aligned for [Lotus founder and Bricklin’s friend] Mitch Kapor [to be successful] just as they had been for me to create VisiCalc,” says Bricklin, who adds that he knew the better program when he saw it.

Turn another corner and things could have been different though. Microsoft’s dominance of PC software could have been even greater had it been smarter with its Multiplan product, Bricklin believes.

Had Bricklin been more aggressive and the laws of the day been different, he could have pursued Lotus through the courts for the many features that arguably were derived from VisiCalc.

“The law in the US was that you couldn’t patent software and the chances were one in ten you could try to sneak it through and call it a system,” he recalls.

In truth, Bricklin would make an unlikely litigant and says he never considered such a path. He is proud, rather, that his legacy still looms large, even if he didn’t make the millions that others did. The tech investor Ben Rosen called VisiCalc “the software tail that wags (and sells) the personal computer dog” and there’s no doubt that it played a big part in what happened later to our digitising universe.

While some pioneers skulk and criticise others that followed them and were successful, Bricklin appears to have no trace of bitterness. He remains a staunch fan of Microsoft and Excel, a product that remains a cash machine and still bears the stamp of VisiCalc, 35 years on.

“Doing VisiCalc, I had to come up with the essence of what you need in 32K of RAM and our notion of what was important was correct, it turned out,” he says.

But the power and richness of Excel are remarkable, he says, rejecting the notion that the Redmond company is guilty of creating bloatware.

“Microsoft came from engineers building things: programmers, programmers, programmers — and the hearts and minds of programmers mattered a lot to them. People want to customise things, make it right for what their problem is. It’s the difference between being a carpenter and being an architect — one size does not fit all.

“Microsoft built systems that could be customised, so users could replace that part themselves and it listened to a lot of people and provided what they wanted, all the bells and whistles. People say you end up with bloatware and only 10% of the features get used by any user but that 10% is different for a lot of users. Apple went for smaller number of people and that’s OK because there’s Microsoft for the rest. [Microsoft] had business practices that people didn’t like but is that different than other companies in other industries? Not necessarily.

“As a child of the Sixties I think of Bob Dylan: ‘the loser now will be later to win’. It goes in cycles. The founder of Intel [Andrew Grove] said it: Only the Paranoid Survive and you only have so much time [at the top].”

If Bricklin was before his time with VisiCalc, he was also early onto new trends in user input, creating pen-operated applications at Slate Corporation in the early 1990s and in 2009, a Note Taker app for the “magical” iPad he so admires.

“I decided I wanted to get into that [iOS] world because there were times when I wanted to get something down and if I write 5 and it’s a bit off, that’s OK. But if I did that on a keyboard and it’s a 6, that’s no good for a telephone number. I got to learn what’s it’s like, that world of app stores and so on, and I did all the support so I got to see what people needed.”

That took him to the latest stage of his journey, as CTO for a company specialising in using HTML5 to make software multiplatform.

“I saw businesses were going to replace clipboards with tablets and that’s why I decided to joinAlpha Software. I couldn’t do everything on my own because there’s so much at the back end you need to do but I wanted to innovate at the front end. Being able to customise is something that’s exciting to watch but it takes time. You’d think that in companies with billions of dollars, why would people be carrying around procedure manuals instead of on a digital reader? But they do. [Automating cross-platform capabilities] is extremely important in business. You’d think that most companies would have started taking great advantage of custom mobile opportunities internally, but most haven’t gotten there yet.”  

Bricklin remains awestruck by changes he has seen in a lifetime of computing that has made him a sort of smarter Forrest Gump or Zelig for the binary age — a person who was around at some of the biggest the zeitgeist moments in computing history.

“When I was working in word processing in my early twenties, I was doing programming for a person who worked for Jay Forrester and the year I was born as it turned out, Forrester showed theWhirlwind computer on TV and that was the first time the general public got to see a computer in action, in this video from 1951 [YouTube clip 

]. Bricklin’s boss stayed up for days making sure it was ready for demo and you can see him there in the background [starting at 4.01]. Those were computers that were the size of big rooms and I was working with him on something you could fit in a desk. And now it’s in the pocket and on a watch soon. This is a progression I’ve seen my whole life and it’s a joy each time.”

Bricklin seems content to be recognised as a founding father of the segment, rather than a Rockerfeller.

“If you look at the old basketball players, they didn’t make as much either,” he says, philosophically. “But we wanted to bring computing to more people and we did that.”

Bricklin delights in the fact that science fiction has become reality and that naysayers have been disproved. It gives him pleasure to think that that those who mocked the personal computer as a place to store recipes now Google their ingredients to automatically generate recipes.

“In 2001: A Space Odyssey they’re using a tablet that looks just like an iPad and it’s this magical device. The crystal ball of fiction is now real. In The Wizard of Oz they had this remote thing; the witch could see things at a distance, control things at distance. This is something you can now buy in a store: a drone-controlling iPad. You can communicate with other people in real time and you can control it with a wave of your hands.”

He ponders the rise of the PC and the changes it wrought as people were freed to create, compose, calculate and pay.

“God!” he exclaims, stretching the syllable in wonder, his voice rising to a crescendo. “It was so exciting to see the thing you believe in succeed and to be accepted. My daughter as a youngster once said, ‘Daddy, did they teach you spreadsheets at school?’ and then, after a few seconds corrected herself. ‘Wait a minute…’ That’s really cool to see people use things that we thought should be used. To be vindicated, that was pretty cool.”

Martin Veitch is Editorial Director at IDG Connect

Link: http://www.idgconnect.com/abstract/8571/spreadsheet-inventor-dan-bricklin-life-computing

Picture of System Administrator

Data center design standards bodies

by System Administrator - Thursday, 12 March 2015, 7:49 PM
 

Words to go: Data center design standards bodies

 by Meredith Courtemanche

Need a handy reference sheet of the various data center standards organizations? Keep this list by your desk as a reference.

Several organizations produce data center design standards, best practices and guidelines. This glossary lets you keep track of which body produces which standards, and what each acronym means.

Print or bookmark this page for a quick reference of the organizations and associated websites and standards that data center designers and operators need to know.

  • ASHRAEThe American Society of Heating, Refrigerating and Air-Conditioning Engineers produces data center standards and recommendations for heating, ventilation and air conditioning installations. The technical committee develops standards for data centers' design, operations, maintenance and energy efficiency. Data center designers should consult all technical documents from ASHRAE TC 9.9: Mission Critical Facilities, Technology Spaces and Electronic Equipment.www.ashrae.org.
  • BISCI: The Building Industry Consulting Service International Inc. is a global association that covers cabling design and installation. ANSI/BICSI 002-2014, Data Center Design and Implementation Best Practices, covers electrical, mechanical and telecommunications structure in a data center, with comprehensive considerations from fire protection to data center infrastructure managementwww.bicsi.org.
  • BREEAMThe BRE Environmental Assessment Method (BREEAM) is an environmental standard for buildings in the U.K. and nearby countries, covering design, construction and operation. The code is part of a framework for sustainable buildings that takes into account economic and social factors as well as environmental. It is managed by BRE Global, a building science center focused on research and certification.http://www.breeam.org/
  • The Green Grid AssociationThe Green Grid Association is well-known for its PUE metric, defined as power usage effectiveness or efficiency. PUE measures how well data centers use power by a ratio of total building power divided by power used by the IT equipment alone. The closer to 1 this ratio comes, the more efficiently a data center is consuming power. Green Grid also publishes metrics for water (WUE) and carbon (CUE) usage effectiveness based on the same concept. www.thegreengrid.org
  • IDCA: The International Data Center Authority is primarily known as a training institute, but also publishes a holistic data center design and operations ranking system: the Infinity Paradigm. Rankings cover seven layers of data centers, from location and facility through data infrastructure and applications. www.idc-a.org
  • IEEEThe Institute of Electrical and Electronics Engineers provides more than 1,300 standards and projects for various technological fields. Data center designers and operators rely on the Ethernet network cabling standard IEEE 802.3ba, as well as IEEE 802 standards, for local area networks such as IEEE 802.11 wireless LAN specifications. www.ieee.org
  • ISOThe International Organization for Standardization is an overarching international conglomeration of standards bodies. The ISO releases a wide spectrum of data center standards, several of which apply to facilities. ISO 9001 measures companies' quality control capabilities. ISO 27001 certifies an operation's security best practices, regarding physical and data security as well as business protection and continuity efforts. Other ISO standards that data center designers may require include environmental practices, such as ISO 14001 and ISO 50001. www.iso.org
  • LEEDThe Leadership in Energy and Environmental Design is an international certification for environmentally conscious buildings and operations managed by the U.S. Green Building Council. Five rating systems -- building design, operations, neighborhood development and other areas -- award a LEED level -- certified, silver, gold or platinum -- based on amassed credits. The organization provides a data-center-specific project checklist, as the LEED standard includes adaptations for the unique requirements of data centers. www.usgbc.org
  • NFPA: The National Fire Protection Association publishes codes and standards to minimize and avoid damage from hazards, such as fire. No matter how virtualized or cloudified your IT infrastructure, fire regulations still govern your workloads. NFPA 75 and 76 standards dictate how data centers contain cold/cool and hot aisles with obstructions like curtains or walls. NFPA 70 requires an emergency power off button for the data center to protect emergency respondents. www.nfpa.org
  • NIST: The National Institute of Standards and Technology oversees measurements in the U.S. NIST's mission includes research on nanotechnology for electronics, building integrity and diverse other industries. For data centers, NIST offers recommendations on authorization and access. Refer to special publications 800-53, Recommended Security Controls for Federal Information Systems, and SP 800-63, Electronic Authentication Guideline. www.nist.gov
  • OCP: The Open Compute Project is known for its server and network design ideas. But OCP, started by Internet giant Facebook to promote open source in hardware, also branches into data center design. OCP's Open Rack and optical interconnect projects call for 21 inch rack slots and intra-rack photonic connections. OCP's data center design optimizes thermal efficiency with 277 Volts AC power and tailored electrical and mechanical components. www.opencompute.org
  • OIX: The Open IX Association focuses on Internet peering and interconnect performance from data centers and network operators, along with the content creators, distribution networks and consumers. It publishes technical requirements for Internet exchange points and data centers that support them. The requirements cover designed resiliency and safety of the data center, as well as connectivity and congestion management.www.open-ix.org
  • Telcordia: Telcordia is part of Ericsson, a communications technology company. The Telcordia GR-3160 Generic Requirements for Telecommunications Data Center Equipment and Spaces particularly relates to telecommunications carriers, but the best practices for network reliability and organizational simplicity can benefit any data center that delivers applications to end users or host applications for third-party operators. The standard deals with environmental protection and testing for hazards, ranging from earthquakes to lightning surges. www.ericsson.com
  • TIA: The Telecommunications Industry Association produces communications standards that target reliability and interoperability. The group's primary data center standard, ANSI/TIA-942-A, covers network architecture and access security, facility design and location, backups and redundancy, power management and more. TIA certifies data centers to ranking levels on TIA-942, based on redundancy in the cabling system.www.tiaonline.org

 

  • The Uptime InstituteThe Uptime Institute certifies data center designs, builds and operations on a basis of reliable and redundant operating capability to one of four tier levels. Data center designers can certify plans; constructed facilities earn tier certification after an audit; operating facilities can prove fault tolerance and sustainable practices. Existing facilities, which cannot be designed to meet tier level certifications, can still obtain theManagement Operations Stamp of Approval from Uptime.www.uptimeinstitute.com

Next Steps

 

 

 


Page: (Previous)   1  2  3  4  5  6  7  8  9  10  ...  22  (Next)
  ALL