Word of the Day: Tech Definitions from WhatIs.com

March 15, 2018  7:28 PM

operational intelligence (OI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Operational intelligence (OI) is an approach to data analysis that enables decisions and actions in business operations to be based on real-time data as it’s generated or collected by companies. Continued…

strong>Quote of the Day

“Applying machine learning models close to the data in a database allows the operational intelligence to be readily shared among different downstream users.” – Mike Matchett

Learning Center
Why you need to design for analytics to succeed at IoT
Timely, reliable, accessible, trustworthy analytics is the future battlefield on which IoT wars will ultimately be won or lost.

Operational data store vs. data warehouse: How do they differ?
Considering operational data store vs. data warehouse platforms? It isn’t an either-or question. They serve different purposes in analytics architectures.

CA mainframe tools ante up with AI
CA Technologies laces AI and machine learning into its mainframe software tools to shore up data management, as the company straddles users’ evolving needs.

Integrated analytics gives users operational intelligence edge
Operational intelligence initiatives that integrate analytics into business processes can enable organizations to make better decisions on the fly, consultant David Loshin says.

SQL Server machine learning goes full throttle on operational data
As Microsoft invests in R and other technologies, SQL Server machine learning opens new analytics possibilities — that is, if IT shops can take advantage.

Trending Terms
real-time BI
advanced analytics
data visualization
self-service BI
predictive maintenance

Writing for Business
The user-training for the new business intelligence software was extensive, in the hopes that employees would be __________ by the change.
a. unphased
b. unfazed

March 14, 2018  6:48 PM

global deduplication

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Global deduplication is a method of preventing redundant data when backing up data to multiple deduplication devices. Continued….

Quote of the Day

“Because global deduplication solutions are specifically designed to address the scalability shortcomings of more traditional deduplication solutions, global deduplication tends to be implemented primarily in large data centers.” – Brien Posey

Learning Center
How does deduplication in cloud computing work and is it beneficial?
Implementing deduplication in cloud backup and storage can present challenges. A storage gateway may be the answer for your organization.

Complete guide to backup deduplication
Backup deduplication, which eliminates redundant data, has grown as a technology. Learn some of its most important aspects with this Essential Guide.

The copy data management market is starting to go mainstream
Products in the copy data management market gain traction as a way to protect production data and enable the use of data copies for DevOps and more.

Can you list some data compression technology pain points?
Data compression technology is a popular data reduction method, but only certain files and systems should undertake the process.

Object storage use cases coming to a data service near you
Expect to see more object storage use cases because of its ability to handle unstructured data sets via auto tagging, auto categorization and analytics.

Trending Terms
target deduplication
source deduplication
data deduplication ratio
load balancing
data deduplication hardware

Writing for Business
If you don’t _______ your data effectively, you risk losing it.
a. backup
b. back up

March 13, 2018  8:37 PM

fault management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Fault management is the component of network management concerned with detecting, isolating and resolving problems. Continued…

Quote of the Day

“Operations teams must provide resilient, fault-tolerant systems — including mainframes — that can handle whatever the application code dishes out.” – Robert Crawford

Learning Center
Network fault management in today’s complex data centers
Network fault management takes new forms as new technologies and designs change the face of today’s modern networks. Here’s what you need to know to identify and troubleshoot faults in network designs and technologies.

Checklist to upgrade your network’s performance
When it’s time to upgrade your network performance, your checklist should include more than improved security and greater throughput.

Networking management: Are you equipped to face the future?
A data center network manager needs to be alert and ready for new challenges. This guide outlines what’s coming and how to keep data center operations flowing.

Enterprise network monitoring tools address companies of all sizes
The leading enterprise network monitoring tools are designed to monitor the performance and availability of devices on networks of all sizes.

Network management platforms address big enterprises, ISPs
Network management platforms monitor the availability and performance of applications and infrastructure for big enterprise and service-provider networks.

Trending Terms
uptime and downtime
network management system
fault tolerant
catastrophic failure
single point of failure

Writing for Business
The project impact analysis found that _______ RAID implementation increased the mean time between failures, there was greater fault tolerance.
a. because
b. since

March 12, 2018  8:35 PM

data sovereignty

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Data sovereignty is the concept that information which has been converted and stored in binary digital form is subject to the laws of the country in which it is located. Continued…

Quote of the Day

“Data sovereignty rules are often the deciding factor for whether a would-be entrepreneur decides to compete in a given market.” – Alex Barrett

Learning Center
FAQ: How is the Privacy Shield Framework being enforced?
In this SearchCompliance FAQ, learn about enforcement of the Privacy Shield Framework and why some privacy advocates claim the rules remain insufficient.

Is data sovereignty affected by my cloud provider’s location?
With a recent government ruling that Microsoft data stored in Ireland is subject to U.S. law, does data sovereignty vary depending on where your cloud provider stores its data?

Data center compliance teams face new privacy, sustainability rules
New data security laws, such as Privacy Shield, will prompt data center compliance teams to rethink their strategies and consider more outsourcing in 2017.

Data privacy in the spotlight with Privacy Shield, Microsoft
Companies conducting transatlantic business got some good news this month around data privacy, but plenty of questions remain unanswered following Privacy Shield and Microsoft’s win.

Examine data collection problems with big data, IoT in mind
Data collection problems can occur when IT doesn’t prepare for big data and IoT changes. Solve these issues and understand how to securely move data.

Trending Terms
Safe Harbor
Patriot Act
data residency
service level agreement

Writing for Business
GDPR’s requirement for ‘privacy by design’ demands new approaches to customer __________ giving customers complete control over their data.
a. relationships, including
b. relationships including

March 9, 2018  8:32 PM

artificial personality (AP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An artificial personality (AP) is a collection of characteristics, tendencies and behavioral quirks assigned to a chatbot, digital assistant, robot or video game character. Continued…

Quote of the Day

“While AI-fueled assistants are popping up everywhere, from home assistants to internet retail sites, the ability to engage in a natural dialogue remains evasive.” – Ed Burns

Learning Center
AI experts advise developers on dev tools
Developers must keep up with advancements in AI, as a new generation of tools provides developers with advanced capabilities, a group of AI experts said.

Chatbot applications must get better at chatting to engage users
Today’s chatbot applications are good order takers, but tomorrow’s should be more conversational in order to be real game-changers, experts say.

To work for us, AI virtual assistants need to speak, see like humans
For AI virtual assistants to become truly useful, conversational technologies need to perfect a bot’s ability to see and hear, said Forrester’s Julie Ask.

Who’s talking? Conversational agent vs. chatbot vs. virtual assistant
IBM Watson VP and CTO Rob High explains the distinction between a chatbot, a conversational agent and a virtual assistant.

AI functionality limited today but could be a game-changer
Today’s limited and overhyped AI functionality could soon give way to technology that is truly transformative for enterprises.

Trending Terms
digital assistant
Turing test
uncanny valley
Alexa Voice Services

Writing for Business
Because time is limited, please hold your questions ____ after the robot demonstration.
a. till
b. ’til

March 8, 2018  8:14 PM

private key

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

In cryptography, a private key (secret key) is a variable that is used with an algorithm to encrypt and decrypt code. Continued…

Quote of the Day

“Because anyone who steals a private key can sign executable code that would then be successfully verified by the electronic device, that key must remain secure.” – Ellen Muraskin

Learning Center
23,000 Symantec certificates revoked following leak of private keys
DigiCert had more than 20,000 Symantec certificates revoked after reseller partner Trustico exposed the certificates’ private keys.

Risk & Repeat: Trustico certificate drama a cause for concern
This Risk & Repeat podcast discusses the recent Trustico certificate drama, the massive certificate revocation it triggered and the questions it raises.

ROCA RSA flaw unveils secret keys on wide range of devices
The ROCA RSA vulnerability takes advantage of poor implementation by Infineon to undermine the security of encryption keys, affecting some popular products.

Embedded security for IoT lies in the chip
Embedded security for IoT gives connected devices the smarts they need to recognize rogue data or instructions before they execute.

Private encryption key sharing worrying but not new, say security experts
A study has revealed a 40% increase in the past year in the number of internet-connected devices using shared encryption certificates, highlighting that this security risk of mass hacking is growing.

Trending Terms
secret key algorithm
asymmetric cryptography
brute force cracking
stream cipher
block cipher
key exchange

Writing for Business
Many organizations don’t give encryption a thought until they suffer a data _______.
a. breach
b. breech

March 7, 2018  6:39 PM

synthetic data

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Synthetic data is information that’s artificially manufactured rather than generated by real-world events. Continued…

Quote of the Day

“Synthetic data can be valuable in situations where data is restricted, sensitive or subject to regulatory compliance.” – David Schatsky

Learning Center
Expert panel warns developers to beware of AI bias
Developers who build AI applications must be on the lookout for AI bias that seems to be inevitable in the current crop of systems.

Synthetic data could ease the burden of training data for AI models
Synthetic data is artificially manufactured training data designed to work as effectively as the real thing.

Big data throws big biases into machine learning data sets
Data bias in machine learning data sets is a big problem for AI, and correcting it is no small feat.

At AI World, ‘black cat’ problems and data mysteries abound
At the recent AI World event, Dun & Bradstreet’s Anthony Scriffignano explains why AI explorations are akin to searching for black cats in a dark room.

How to win in the AI era? For now, it’s all about the data
In today’s AI era, data is what will separate winners from losers in the race to exploit artificial intelligence, according to deep learning pioneer Andrew Ng.

Trending Terms
algorithmic accountability
deep learning
machine vision
data scientist
machine learning

Writing for Business
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
a. raise
b. rise

March 6, 2018  6:31 PM

medical transcription software (MTS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Medical transcription software (MTS) is a specialized speech recognition program that includes a database of medical terminology. Continued…

Quote of the Day

“Recording transcripts allow users to see clearly who is speaking, when they spoke, and do an intelligent search by keywords.” – Roopam Jain

Learning Center
Blue Jeans integrates AI-powered transcription technology
Blue Jeans and Voicera partner to bring AI transcription technology to online meetings, while ZaiLab enters the U.S. cloud contact center market.

How to purchase, implement a medical speech recognition system
A medical speech recognition system can help health care facilities achieve meaningful use, thanks to digitized records. CIOs show how it’s done.

Mobile and IoT drive better outcomes in healthcare
Mobile devices and IoT technology are creating a seamless, secure experience for patients and healthcare organizations alike.

Automated transcription services could be integral to web conferencing
Zoom will let users automatically transcribe online meetings. More web conferencing vendors are expected to add automated transcription services soon.

A look at the leading medical imaging software on the market
Learn about the leading medical imaging software and how these products help blend old and new tech to promote collaborative healthcare environments.

Trending Terms
speech recognition
medical transcription
electronic health record
health IT
streaming sound

Writing for Business
The concept of electronic health records ______ interoperability.
a. implies
b. imply

March 5, 2018  10:18 PM

conversational user interface

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A conversational user interface is programming that allows a chatbot to communicate informally with a human end user. Continued…

Quote of the Day

“With this movement toward automated conversation, it could be debated that human-to-human interaction is becoming less important in sales.” – Jesse Scardina

Learning Center
When selling on social media, marketers weigh chatbots vs. humans
Deciding whether to have chatbots interact with customers or actual humans behind the keyboard for selling on social media depends on a number of variables.

Why voice interfaces remain challenging
While voice recognition is much improved and its place in IoT architectures is perceivable, it can still be hard to communicate.

IBM Watson CTO: A range of conversational technologies can coexist
When it comes to conversational technologies like chatbots and smarter AI agents, IBM Watson VP and CTO Rob High said there’s room for both in the enterprise.

AI chatbots augment humans working in contact centers
As AI chatbots start to infiltrate contact centers, human agents can still sleep soundly at night. Their jobs aren’t going anywhere yet.

Facebook Messenger chatbots follow HubSpot Motion AI acquisition
Facebook Messenger chatbots took center stage at Inbound, the annual customer HubSpot conference, after the company’s Motion AI acquisition.

Trending Terms
call center agent
customer engagement
voice user interface
virtual assistant
Facebook Messenger

Writing for Business
Our data shows that a vast majority of customers prefer Brand A  ____ Brand B.
a. to
b. than
c. over

March 2, 2018  10:13 PM

federated identity management (FIM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group. Continued…

Quote of the Day

“With identity federation, administrators don’t have to contend with many of the issues that come with balancing multi-domain access.” – Robert Sheldon

Learning Center
Explore the pros and cons of identity federation management
Identity federation management makes end users happy, but it can be complicated for IT teams. A thoughtful plan can ensure the transition is as smooth as possible.

How to deal with Identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Identity and access management strategy: Time to modernize?
Security expert Michael Cobb outlines why the identity and access management strategy of many firms might be due for updating and explains how to get started.

‘Federated’ identity and access management tools
Get expert guidance on ways to employ Active Directory Federation Services and AD Connector as identity and access management tools in the cloud.

Set up an identity and access management system for public cloud
An identity and access management system is critical to any cloud security strategy. Know what your provider offers, and create user groups carefully.

Trending Terms
onboarding and offboarding
identity management
identity and access-management
Active Directory Federation Services
single sign-on
AWS Security Token Service

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: