Browse Definitions :
Quiz

Who's Who in IT: Question #3

Who's Who in IT: Question #3

 
Use the clues below to help you identify an important person in IT.

- I published my first book, The Mathematical Analysis of Logic, in 1847.

- I am credited with being the first mathematician to successfully demonstrate that logic could be represented by algebraic equations.

- After getting caught in the rain and catching a cold, my wife dumped buckets of water on me because it seemed logical to her that whatever had caused my illness would also cure me. (I died of pneumonia.)

- When you use a search engine, you use my mathematical concepts to locate information by defining a relationship between the terms you enter.

 

Who am I? _________________________________


(scroll down for answer)












Answer: George Boole, creator of Boolean logic.

Do you have a suggestion for someone we should feature in Who's Who in IT? Let us know!


Who's Who in IT: Question #1
Who's Who in IT: Question #2
This was last updated in May 2008
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close