Word of the Day: Tech Definitions from WhatIs.com


May 24, 2017  7:37 PM

churn rate

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Churn, Customer churning

Churn rate is a measure of the number of customers or employees who leave a company during a given period. It can also refer to the amount of revenue lost as a result of the departures. Continued…

Quote of the Day
“Turnover is a reality in any organization, so it’s wise to have a pipeline for new talent coming into the organization.” – Ernie Hayden

Learning Center
Corporate wellness software can help employers reduce turnover
Wellness programs are integral to employee engagement and retention, according to data from a corporate wellness software vendor.

The link between employee engagement and customer experience
Some experts argue that the secret to a good customer experience is engaged employees, and that principle goes beyond contact centers to the company at large.

Don’t let false assumptions drive your customer communication strategy
Companies often assume they know their customer base and dial in customer communications. Here are three tactics to ensure your communication strategy is on target.

Effectively use surveys to measure and increase employee engagement
Learn how one HR executive partnered with a survey provider to measure his organization’s employee engagement and analyzed it against benchmarks.

Marketing company uses in-database analytics to fight customer churn
Trident Marketing employed an IBM Netezza in-database analytics data warehousing appliance and Fuzzy Logix libraries to beat customer churn.

Trending Terms
customer satisfaction
predictive technology
employee churn
leaky bucket
monthly recurring revenue

Writing for Business
The amount money a customer invests in a service can reduce a company’s churn rate and increase the chances they’ll stick with around for the long ______.
A. haul
B. hall
Answer

May 23, 2017  7:28 PM

R programming language

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Open source, Predictive Analytics, R language

The R programming language is an open source scripting language for predictive analytics and data visualization. Continued…

Quote of the Day

“In addition to being well-suited to advanced statistics, R’s open source nature and free availability under the GNU General Public License have also contributed to its rising star power.” – Robert Sheldon

Learning Center
The ins and outs of using R in SQL Server 2016 and 2017
Using R in SQL Server 2016 and 2017 could benefit enterprise users, but it’s important to know the difference between Microsoft’s various R-based technologies.

R programming language demands the right use case
R’s growing popularity among programmers and organizations has attracted the attention of technology vendors, many of which now offer R-based products or support the language in their own software.
IBM Watson gets CognizeR extension

In the past, R has been criticized for delivering slow analyses when applied to large data sets, but more recent versions of the language are attempting to address this problem.

Revolution brings R programming language to AWS, plus SAS on Hadoop
Revolution Analytics brings the R programming language to the cloud, while SAS readies a new in-memory analytics platform to run on Hadoop.

Data preparation steps increase to meet predictive analytics needs
Data scientists building predictive models and machine learning algorithms often have to do more data preparation work upfront than is necessary in conventional analytics applications.

Trending Terms
open source
predictive analytics
data visualization
loop
data scientist

Writing for Business
Linus Torvalds _______ choosing to be an open source software engineer is a calling, rather than a career choice.
a. said that
b. said
Answer


May 22, 2017  5:25 PM

seven wastes

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
DevOps, Kaizen, Lean processes

The seven wastes are categories of unproductive manufacturing practices. Continued…

Quote of the Day

“Lean methodologies are centered around learning: from your customers, your data and from every line of code you build and put in front of customers.” – Christopher Ward

Learning Center
Comparing development methodologies: Agile vs. DevOps vs. Lean Startup
If comparing development methodologies is getting to be a bit much, expert Christopher Ward has the answer. Here’s his take on Agile, DevOps and Lean.

How can lean manufacturing concepts be used with MRP and ERP?
Lean manufacturing concepts use a pull technique, while MRP and ERP use push. Can these opposing concepts play nice?

Smart manufacturing technology is a dumb idea without good leadership
The CEO of Miller Ingenuity explains why the smart manufacturing technology revolution demands an educated workforce and respectful leadership.

A DevOps primer: Start, improve and extend your DevOps teams
Turning to DevOps teams may seem to be the logical next step for your enterprise. This guide covers best strategies from start to finish.

Go beyond Agile, or miss out on the fourth industrial revolution
IT leaders must go beyond Agile if they aim to take advantage of the fourth industrial revolution.

Trending Terms
just-in-time manufacturing
lean programming
Toyota Way
kaizen
agile software development
DevOps

Writing for Business
Taiichi Ohno studied supermarket operation for _______ before developing Toyota’s rules for lean production.
a. awhile
b. a while
Answer


May 19, 2017  7:55 PM

Net Neutrality (open internet)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Net Neutrality

Net Neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source. Continued…

Quote of the Day

“The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network.” – Russ White

Learning Center
Net neutrality explained: The idea is simple, but appearances deceive
When it comes to net neutrality explained, there’s more to it than just treating every packet the same.

Net neutrality law: Much ado about nothing?
President Drumpf’s free-market pick for the FCC might dismantle net neutrality law, but some industry watchers say that’s not such a big deal.

In aftermath of FCC privacy rules repeal, uncertainty, ironies abound
ISPs stand to make billions from the rollback of FCC privacy rules, but does the move hurt our success in the data economy? Also: brain-computer interfaces.

Does Internet neutrality shake up IoT plans?
The Internet of things is generating more data, but what happens when Internet neutrality affects how that information is received? Find out how Net neutrality challenges IoT.

Why SDN and NFV thinkers should care about net neutrality
Now that a circuit court struck down net neutrality rules, will SDN and NFV be used as tools to create an anti-competitive Internet?

Trending Terms
net bias
two-tiered Internet
common carrier
edge provider
zero rating
telecom carrier

Writing for Business
Telecom carriers are increasingly making a ______ into cloud services.
a. segway
b. segue
Answer


May 17, 2017  6:41 PM

bill of materials (BoM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Bill of Materials, Manufacturing

A bill of materials (BoM) is a list of the parts or components that are required to build a product. Continued…

Quote of the Day

“Engineering and manufacturing must work together to be sure that their separate, but related versions of the BOM are always in sync and up to date.” – Dave Turbide

Learning Center
What’s holding back growth of 3D printing and additive manufacturing?
Whether 3D printing and additive manufacturing can grow beyond small-scale manufacturing depends on the industry getting together on machines, standards and education.

Are both an engineering bill of materials and a manufacturing BOM needed?
Manufacturers need an engineering bill of materials and a manufacturing bill of materials for any given product. Here’s why.

Use SAP MRP to effectively plan production and procurement
The SAP MRP module can optimize production or procurement plans. An expert explains how to use it for consumption-based planning and material requirements planning.

Manufacturing tips for Kanban production control and BOM management
Discover how Oracle E-Business Suite supply chain management (SCM) software helps manufacturers with Kanban setup and production control. Find out how Oracle SCM software can improve bill of materials (BOM) management.

Manufacturing requirements planning: The four critical questions answered
Read a key chapter in the recently revised and updated “Orlicky’s Material Requirements Planning,” considered by some to be a landmark book by one of the pioneers of MRP.

Trending Terms
manufacturing process management
engineering bill of materials
computer-aided design
material requirements planning
supply chain management

Writing for Business
The user found that the application worked well if she could get the phone view ________ with the package barcode.
a. orientated
b. oriented
Answer


May 16, 2017  4:18 PM

infosec

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Infosec

Infosec (information security) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Continued…

Quote of the Day

“[Trump’s executive order] is not a plan to fix the federal government’s cybersecurity challenges. Instead, it’s a directive to each agency to implement the NIST framework to assess the agency’s cyber risks and create plans to mitigate them.” – Leo Taddeo

Learning Center
Trump cyber executive order focuses on cyber-risk management
The directive forces agency and department heads to demonstrate the degree to which they have strategically viewed cybersecurity risk.

Six keys to creating strong data-security measures
The need for effective data-security measures is more critical than ever before. Here’s why, as well as six information-protection best practices.

Tabletop cybersecurity exercises essential to infosec training
As companies stare down seemingly endless sources of data threats, tabletop cybersecurity exercises are a great way to kick start infosec training efforts.

How infosec professionals can improve their careers through writing
Infosec professionals should look to raise their profiles and reputations. Expert Joshua Wright explains how infosec careers can benefit from writing.

Mobile endpoint security: What enterprise infosec pros must know now
Achieving mobile endpoint security can be tough. This essential guide walks security pros through its many aspects.

Trending Terms
risk management
information assets
confidentiality, integrity and availability
defense in depth
ISO 27001
Federal Information Security Information Act

Writing for Business
The security of clients’ personal information is of _______ importance.
a. upmost
b. utmost
Answer


May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued…

Quote of the Day

“Ransomware attacks happen, but the important thing is to minimize the impact and demonstrate a timely recovery.” – Mike O. Villegas

Learning Center
Ransomware protection best served by backing up your data
Good data storage practices and effective data backup are the best approaches when it comes to offering ransomware protection in your company.

Ransomware threat continues to evolve, defense needs to catch up
Ransomware threat abounds, but RSA Conference 2017 speakers say victims should avoid paying ransoms and weigh their options to access critical data.

Why healthcare ransomware attacks are a growing threat to health IT
Healthcare ransomware attacks plagued hospitals in 2016: experts predict the threat will rise in 2017 due to outdated systems and lax security practices.

Five ways to prevent a ransomware infection through network security
A ransomware infection can be stopped in its tracks by strong network security. Here are five simple steps enterprises can take to bolster their networks.

Cheap ransomware as a service arrives for malicious actors
The Karmen ransomware as a service offers a very low price and interesting features for the enterprising malicious actor.

Trending Terms
cyberextortion
cryptoperiod
malware
encryption
doxware
infosec

Writing for Business
Ransomware hasn’t been in the news for _______ but it seems to be making a comeback.
a. a while
b. awhile
Answer


May 12, 2017  6:20 PM

privilege creep

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Identity & Access Management

Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. Continued…

Quote of the Day

“Manually trying to manage a large number of users’ privileges is a time-consuming and resource-draining process and will lead to mistakes and oversights.” – Michael Cobb

Learning Center
Enlightened shadow IT policy collaborates with users
A shadow IT policy that manages risk has to change with the times, as cloud services offer users easy access to necessary apps.

Shadow apps in the cloud threaten IT data governance
Deploying cloud apps can take far less time than going through IT to do the same work on premises. But these shadow apps cause IT data governance issues.

Beyond shadow IT risks, opportunity awaits
Shadow IT risks pose a threat to the enterprise, but, when properly managed, the use of unsanctioned apps can lead to new cloud computing innovations.

Build a shadow IT strategy all departments will love
To build a successful shadow IT strategy, IT pros must remember that, in many cases, shadow apps meet a business need that existing IT systems don’t.

Shadow IT cited as reason why some firms lack formal cloud strategy
New research from VMTurbo suggests firms are using cloud, even if they claim not to have a formal private or public deployment plan in place.

Trending Terms
feature creep
identity access management (IAM) system
access governance (AG)
access recertification
privilege escalation attack

Writing for Business
I’ve saved the folder to Dropbox and will send the link to _________.
a. he and Charles
b. him and Charles
c. Charles and he
d. Charles and him
Answer


May 10, 2017  4:17 PM

one-time password token (OTP token)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
multifactor authentication, OTP, Password authentication

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. Continued…

Quote of the Day

“Strong authentication methods typically involve dynamically generated OTPs or certificate- and context-based authentication.” – Dan Sullivan

Learning Center
Multifactor authentication: A buyer’s guide to MFA products
Learn about the evolution of multifactor authentication technology, as well as how to procure and buy the right MFA products for your organization.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long term solutions to the challenges of effective and secure authentication.

Why mobile two-factor authentication is better than biometrics
By adding a second criterion to device access, mobile two-factor authentication makes it much more difficult for hackers to access users’ devices.

Authentication in the cloud: Are more open standards the answer?
Cloud security expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help ensure secure user authentication in the cloud.

Trending Terms
key fob
multifactor authentication
two-factor authentication
Google Authenticator
FIDO

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


May 9, 2017  6:46 PM

OpenShift

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
OpenShift, Red Hat

OpenShift is RedHat’s cloud development Platform as a Service (PaaS). The free and open source cloud-based platform allows developers to create, test and run their applications and deploy them to the cloud. Continued…

Quote of the Day

“OpenShift spans a broad swath of new technologies, such as containers, software-defined storage and software-defined networks, but also requires skills in administering VMs and server hardware in on-premises deployments.” – Beth Pariseau

Learning Center
Signs point to cloud future at Red Hat Summit 2017
At Red Hat Summit 2017, the open source software company made overtures toward cloud computing.

Delving into the container-based Red Hat PaaS, OpenShift
The Red Hat PaaS, OpenShift, combines Docker and Kubernetes features to provide app dev teams container management and orchestration capabilities.

IT pros strive to embrace OpenShift container portability advances
Red Hat and Amazon Web Services focus on container portability in OpenShift collaboration, signaling a multicloud and hybrid cloud roadmap.

Red Hat OpenShift opens doors for container-based mobile app dev
Red Hat OpenShift and AWS announced a new collaboration at the Red Hat Summit that could make mobile app deployment easier for developers.

Create a PaaS model for application portability
A PaaS model offers operational simplicity, but can present lock-in risks. Evaluate these four options to make your PaaS environment portable.

Trending Terms
Red Hat
PaaS
open source
cloud computing
Cloud Foundry

Writing for Business
Open source describes any software whose source code is in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: