WhatIs.com Word of the Day Archive


December 2, 2016  10:50 PM

click fraud

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Botnet, click fraud, Ransomware

Click fraud is the practice of artificially inflating traffic statistics for online advertisements. In the common pay-per-click advertising model, advertisers pay a fee for each click on their ad, anticipating that they have attracted a potential customer. Continued…

Quote of the Day

“Ad fraud botnets are being used to inflate the web views all across the internet. It looks as if there is more browsing happening than there actually is.” – Michael Tiffany

Learning Center
How ad fraud botnets are costing companies billions of dollars
Michael Tiffany of White Ops talks with SearchSecurity about how ad fraud botnets are spreading and costing companies billions of dollars a year.

Click fraud to ransomware: Study highlights dangers of malware lifecycle
New research puts the malware lifecycle in the spotlight, explaining how a click fraud malware transformed into ransomware in less than two hours.

Is click fraud malware hiding bigger potential threats?
Simple click fraud malware can be easily changed into more dangerous ransomware. Here’s how to assess the potential of low-level threats.

How does the HummingBad malware enable click fraud?
The HummingBad malware has been used to generate click fraud revenue from 10 million infected devices worldwide. Find out how the malware works.

Machine versus the bots: Does your website pass the Turing 2.0 test?
Robert Richardson questions whether computers can detect the bots vs. real users, as security tools use browser behavior and polymorphism to protect against data theft and fraud.

Related Terms
click farm
phishing
ransomware
botnet
malvertisement

Related Tags
Malware, viruses, trojans and spyware
Web application and Web 2.0 threats

December 1, 2016  9:34 PM

DataOps

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data Science, DevOps

DataOps (data operations) is an approach to designing, implementing and maintaining a distributed data architecture that will support a wide range of open source tools and frameworks in production. Continued…

Quote of the Day

“DataOps is a data management method that emphasizes communication, collaboration, integration, automation and measurement of cooperation between data engineers, data scientists and other data professionals.” – Andy Palmer

Learning Center
Up-and-coming data engineers complement entrenched data scientists
Data engineers come online to do data wrangling and programming. They join vaunted data scientists, who focus more on math and analytics.

Experts advise on data science for business teambuilding
A modern data science for business team should acknowledge that you can’t find all the skills you need in one person. A diverse team can deliver better results.

Emerging: DataOps and three tips for getting there
DataOps and Agile analytics enjoyed a bit of the spotlight at the third annual Boston Data Festival: The Data Mill reports.

Data science team building 101: Cross-functional talent key to success
At BigData TechCon in Boston, data scientists discussed approaches to solving today’s new data analytics problems. A data science team leader touted team-based approaches.

Building data science teams takes skills mix, business focus
Analytics managers offered advice on building data science teams as part of a Strata + Hadoop World 2016 panel discussion on finding and retaining data scientists.

Related Terms
DevOps
LOB
data scientist
BizDevOps
data engineer

Related Tags
Data stewardship
Enterprise data architecture best practices


November 30, 2016  9:13 PM

FRPC Rule 41

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Security, VPN

FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Continued…

Quote of the Day

“While the changes to Rule 41 are intended to assist U.S.-based investigations, there is nothing stopping judges from applying the legislation globally now that jurisdiction is no longer an obstacle.” – Yorgen Edholm

Learning Center
Rule 41: Why security and privacy experts are wary
Rule 41 of the Federal Rules of Criminal Procedure has security and privacy experts frustrated. Here’s a closer look at the rule and why it’s important.

Risk & Repeat: Will Rule 41 changes become cybersecurity law?
This Risk & Repeat podcast episode discusses the proposed Rule 41 changes, which go into effect on Dec. 1, 2016, and a last-ditch effort to stop them.

Congress floats last-chance bill to delay Rule 41 changes
The Review the Rule Act looks to delay until July 2017 the controversial changes to Rule 41, which would expand government powers to access systems.

Senate bill would quash unlimited Rule 41 government hacks
Read about a Senate effort to limit remote, unlimited government hacking power with a bill to reverse the Supreme Court and Justice Department on Rule 41.

Activists, DOJ spar over Rule 41 changes to enhance FBI searches
Despite DOJ claims that Rule 41 alterations change nothing, protests by a coalition of tech firms, privacy and rights activists led by EFF continue to grow.

Related Terms
anonymous Web surfing
remote access
Electronic Frontier Foundation
botnet
virtual private network
TOR routing

Related Tags
Information security laws investigations and ethics
Government IT security management


November 22, 2016  5:30 AM

canary (canary testing)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
PEN testing, Testing

In software testing, a canary (also called a canary test) is a push of programming code changes to a small number of end users who have not volunteered to test anything. The goal of a canary test is to make sure code changes are transparent and work in a real world environment. Continued…

Quote of the Day

“Plan a canary app rollout for relatively small changes where confidence in the release is high, such as testing problem fixes or regressions.” – Stephen J. Bigelow

Learning Center
Automated out of a job? Results from the Harvey Nash Technology Survey
The Harvey Nash Technology Survey 2017 shows software testers and others fear automation may eliminate their jobs. Here’s what to prepare for.

Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.

Want disciplined DevOps software delivery? It takes six steps
If the goal is disciplined DevOps software delivery, get ready to make some changes. Expert Yvette Francino explains.

Dissect DevOps problems with this expert podcast
DevOps problems arise due to a litany of reasons, ranging from implementation to lack of a proper culture change. Learn to tackle these problems at the source.

For web companies, optimizing CI/CD mandates an IT infrastructure upgrade
Continuous integration and deployment aren’t just about the developer experience — they also often necessitate an IT infrastructure upgrade.

Related Terms
testing
A/B testing
sandbox
bug
pen testing

Related Tags
Agile DevOps
Application rollout planning and problems


November 18, 2016  9:21 PM

predictive modeling

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
CRM, Predictive Analytics, predictive modeling

Predictive modeling is a process that uses data mining and probability to forecast outcomes. Continued…

Quote of the Day

“In looking to unleash effective and speedy predictive modeling techniques in an organization, bringing a standard business intelligence mindset to the process won’t cut it.” – Mike Lampa

Learning Center
How predictive modeling and forecasting failed to pick election winner
Predictive modeling and forecasting this election cycle failed to see the Drumpf phenomenon coming and missed the mark by a mile in their predictions.

Faster modeling techniques in predictive analytics pay off
Businesses can’t let data scientists get bogged down in academic predictive modeling techniques. If the process doesn’t pay off, it’s time to reevaluate priorities.

Big data analytics projects raise stakes for predictive models
Big data analytics projects can sink or swim based on how organizations cope with technical and skills issues that must be considered as part of the analytical modeling process.

Talking Data podcast: Predictive modeling techniques
This edition of Talking Data examines the finer points of predictive modeling techniques.

Building predictive analytics models takes a team effort
Analytics managers say data scientists should put algorithms through the wringer when building predictive analytics models to ensure that the models deliver valid results.

Related Terms
predictive analytics
data mining
CRM
capacity planning
change management

Related Tags
Data modeling tools and techniques
Predictive analytics


November 10, 2016  9:21 PM

network behavior anomaly detection

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Security

Network behavior anomaly detection (NBAD) is the continuous monitoring of a proprietary network for unusual events or trends. Continued…

Quote of the Day

“It’s essential that you extend your security controls beyond the perimeter, adding network anomaly detection capabilities to your other existing security tools.” – Peter Sullivan

Learning Center
Behavioral threat assessment means real-time threat detection
A behavioral threat assessment tool that provides real-time threat detection may be just what your enterprise security system needs now.

Knock advanced malware out cold with network anomaly detection
Peter Sullivan explores the need for network anomaly detection to protect the enterprise network from advanced malware in this Security School.

How to integrate network behavior anomaly detection into enterprise systems
Network behavior anomaly detection (NBAD) can be a valuable tool for financial firms. However, without proper integration, the tool is useless. In this tip, we lay out the steps required for a successful integration.

The case for using anomaly-based monitoring in zero-day detection
In light of recent failures by the signature-based model, expert Char Sample discusses anomaly-based monitoring technology and the potential it holds for enterprise security.

Can behavioral detection improve enterprise network security?
Expert Kevin Beaver discusses whether multi-session behavioral detection and traffic analysis is more effective malware detection than traditional perimeter technologies.

Related Terms
network behavior analysis
malware
zero-day exploit
intrusion detection
antivirus software

Related Tags
Network behavior anomaly detection
Data analysis and classification


November 9, 2016  8:50 PM

BizDevOps

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Agile software development, DevOps

BizDevOps, also known as DevOps 2.0, is an approach to software development that encourages developers, operations staff and business teams to work together so the organization can develop software more quickly, be more responsive to user demand and ultimately maximize revenue. Continued…

Quote of the Day

“The tricky challenge of BizDevOps is to ensure that information is shared equally with everyone — particularly developers — so customer-first decisions are made.” – Valerie Silverthorne

Learning Center
Tried and true advice for getting started with BizDevOps
BizDevOps, the next gen of DevOps, will take time, patience and sweeping cultural changes in order to work. Here’s a roundup of advice.

BizDevOps and digital performance management are the new drivers
Call it BizOps or BizDevOps, digital performance management uses metrics to determine which slow pages to fix first. And no, it’s not the slowest one.

Wondering what comes after DevOps? Developers, it’s time for BizDevOps
BizDevOps is next-gen DevOps, bringing business people into the development and deployment process. Here’s how and why it works.

Overcoming the scale-up challenge of enterprise DevOps adoption
CIOs and IT leaders share their advice on what enterprises can do to accelerate the spread of DevOps within their organizations.

Learn the secrets of developing soft skills in coders
Developers with strong communication skills are in demand today. Expert Bruce Tulgan explains developing soft skills in coders.

Related Terms
DevOps
IT operations
agile software development
real-time analytics
app monitoring

Related Tags
Agile DevOps
DevOps and IT certifications and training


November 7, 2016  9:47 PM

clickstream analysis

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
CRM analytics, E-commerce

On a Web site, clickstream analysis (also called clickstream analytics) is the process of collecting, analyzing and reporting aggregate data about which pages a website visitor visits — and in what order. The path the visitor takes though a website is called the clickstream. Continued…

Quote of the Day

“By using customer data analytics, companies have made significant strides in understanding customer preferences and behavior.” – Lauren Horwitz

Learning Center
Companies still struggle to unlock customer data analytics insight
Customer data analytics is the new black in sales, marketing and service. Companies know understanding customer data will lead to success in the future.

Customer personalization brings intelligence to sales and marketing
Companies no longer succeed with generic messaging to customers. Companies are investing in customer personalization technologies to help them tailor messaging to their clientele’s needs and preferences.

Customer data silos continue to hobble the omnichannel experience
Companies believe in the omnichannel experience and the ability to serve customers seamlessly across communication channels. But customer data silos still hobble the vision.

Data collection practices spark debate on big data ethics, privacy
The increasing emphasis on collecting and analyzing customer data is driving a debate on big data ethics and whether tighter privacy rules are needed to protect consumers.

Clickstream data edges retailer into ‘big data’ analytics territory
Big data analytics grapples with huge data sets coming at a quickening pace, but one Gartner analyst said data variety is having the greatest impact on businesses. Learn why that is and how the analytics environment is changing.

Related Terms
CRM analytics
bounce rate
Web mining
implicit data

e-commerce

Related Tags
CRM analytics and business intelligence
Big data analytics


November 7, 2016  4:27 PM

poison mailbox

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Exchange 2010

A poison mailbox is a corrupted mailbox on the Exchange Server that causes disruptions on the Exchange database store. Continued…

Quote of the Day

“There is no doubt that email can be problematic in businesses, particularly in large enterprises. The sheer volume of email messages, sprawling distribution lists and the unsuitability of using email to transfer and collaborate on documents are real issues.” – Paul Cunningham

Learning Center
Understanding message queues in Exchange 2007 Queue Viewer
Read how Exchange Server 2007 message queue types guide mail flow through a transport pipeline and learn how to monitor the Queue Viewer to prevent issues.

The best email security gateways: A buyer’s guide
Learn how the best email security gateways work, how they protect enterprises from emails threats and how to select and buy them.

Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.

Detecting and Combating Malicious Email
In this excerpt of Detecting and Combating Malicious Email, authors Julie JCH Ryan and Cade Kamachi discuss the elements of an email structure and touch on how attackers can use these elements to trick unwitting victims.

New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?

Related Terms
Microsoft Exchange Server 2010
registry key
email spoofing
Exchange 2013 Poison Message Queue
Sender Policy Framework

Related Tags
Microsoft Exchange Server administration tools
Email and messaging threats


November 3, 2016  8:08 PM

OpenConfig

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
DevOps, SDN

OpenConfig is a working group and network communication model that seeks to standardize network management interfaces and APIs across vendors. Continued…

Quote of the Day

“Software-defined networking has matured from a science experiment into deployable, enterprise-ready technology in the last several years, with vendors from Big Switch Networks and Pica8 to Hewlett Packard Enterprise and VMware offering services for different use cases.” – John Burke

Learning Center
Yahoo, Verizon execs: Prepare your networking team for SDN and DevOps
Verizon and Yahoo talked about the need for networking team members to look toward SDN and DevOps at ONUG’s fall 2016 conference.

How to assess the benefits of SDN in your network
The proposed benefits of SDN are becoming clearer, as are the questions you should ask about an SDN deployment to address your networking issues.

Could OpenConfig resolve automation struggles?
In this SDN blogs roundup, OpenConfig could make automation easier and why enterprises should keep it simple when solving network problems.

DevOps or SDN? You’ll need them both to work together
When it comes to DevOps or SDN, do you really need to choose one over the other? Most IT shops will need both. SDN will be the ultimate DevOps tool set, while DevOps will make IT pros SDN-ready.

Where SDN and DevOps tools meet
Combining SDN and DevOps tools will mean the network can play a key role in IT orchestration and an application-aware, responsive infrastructure.

Related Terms
CLI
SDN
application program interface
DevOps
IETF

Related Tags
SDN research
Network automation and orchestration


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: