Word of the Day: Tech Definitions from WhatIs.com


February 23, 2017  9:50 PM

alternative data

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Data democratization, Predictive Analytics

Alternative data is information gathered from non-traditional information sources. Continued…

Quote of the Day

“In the age of big data, knowing what information is needed in analytics applications, and what isn’t, has never been more important — or in many cases, more difficult.” – Ed Burns

Learning Center
Big data challenges include what info to use — and what not to
For organizations faced with big data challenges, it helps to be selective about the info you analyze.

New cloud service uses big data sources to improve emergency response
A new cloud service from Swan Island Networks allows cities to tie information together from multiple big data sources to improve emergency response.

Approach big data projects with care, purpose
If they’re going to succeed, big data projects must adhere to the same guidelines as any big IT project.

Weather analytics project taps big data to optimize farm irrigation
The Flint River Partnership is testing weather analytics technology as part of a big data project aimed at generating localized weather forecasts for farmers in Georgia.

Data warehousing architecture gets a big data makeover
In the digital age, data warehousing architecture shies away from the monolithic enterprise data warehouse in favor of flexibility.

Trending Terms
data democratization
data-driven decision management
risk assessment
historical data
predictive analytics

Writing for Business
The majority of stakeholders want access to current information as well as ________ data.
a. historical
b. historic
Answer

February 22, 2017  2:55 AM

data democratization

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Data democratization

Data democratization is the ability for information in a digital format to be accessible to the average end user. Continued…

Quote of the Day

“At the core of the shift to data democratization is technology. Technological advances have allowed providers to create digital data gathering and analytics platforms that don’t require data science expertise in order to gain valuable insights quickly from data.” – Frédéric-Charles Petit

Learning Center
How data democratization can enhance decision making
There are some rules to live by in creating meaningful access to data. An expert from Bluewolf explains how BI tool adoption enables data democratization.

Users discontent with data insights from analytics apps
Companies still struggle to get meaningful data insights from their analytics tools. Can Salesforce Wave fill the gap?

Understanding BI analytics tools and their benefits
Expert Rick Sherman examines the different BI analytics tools categories, the vendor landscape and how these tools are deployed.

Choose your weapon: top analytics strategies revealed
The best analytics strategies focus on fast-payoff data and applications and knowing how cloud, on-premises, embedded and third-party BI tools differ.

San Francisco data analytics early-stage firms point to third-wave BI
California start-up and early-stage data analytics companies are positing technologies that point beyond second-generation business intelligence, such as Qlik and Tableau.

Trending Terms
data visualization
alternative data
database management system
self-service BI
virtual database
smart city

Writing for Business
Although big data is getting bigger all the time, much of the data being collected ______ useless.
A. is
B. are
Answer


February 20, 2017  3:20 PM

Microsoft HoloLens

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Microsoft HoloLens is a virtual reality (VR) headset with transparent lenses for an augmented reality experience. Continued…

Quote of the Day

“HoloLens is immersive, and is much more of an output and input device.” – Wes Miller

Learning Center
HoloLens tested for bridge inspections
Cambridge University is investigating how augmented reality could help improve safety and lower the cost of inspecting large structures such as bridges.

HoloLens: Microsoft hologram technology exhibits healthcare prospects
The cadavers used by medical students may be replaced if the Microsoft hologram technology, HoloLens — capable of producing 3-D models — makes its way into healthcare.

Is the Microsoft HoloLens 3D headset the next great enterprise mobility tool?
Learn how businesses can use the Microsoft HoloLens 3D headset to increase productivity, even though it’s not an ideal enterprise mobility tool.

Windows 10 brings security, Cortana for PCs and holograms
A sneak peak of Windows 10 has brought enthusiasm back to Microsoft, with Universal Apps, Office for tablets, Cortana for PCs and Windows Holographics.

Augmented and virtual reality make a play for the enterprise
Experts at Deloitte Digital explained why augmented and virtual reality are poised to shake up the enterprise: The Data Mill reports.

Trending Terms
holographic processing unit
augmented reality
VR headset
holographic display
virtual reality
spatial sensing

Writing for Business
Microsoft HoloLens mixes cameras and holographic video over a person’s actual _________.
A. perspective
B. prospective
Answer


February 17, 2017  5:41 PM

recovery time objective (RTO)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Disaster Recovery, Recovery Point Objective, Recovery Time Objective

The recovery time objective (RTO) is the maximum tolerable length of time that a computer, system, network, or application can be down after a failure or disaster occurs. Continued…

Quote of the Day

“To meet a tighter recovery point objective window, you must capture data more frequently than the traditional once-a-day backup process.” – George Crump

Learning Center
RTO, RPO metrics find the true value of a cloud DR strategy
Measuring RTO, RPO metrics are a more effective means of determining the value of cloud DR over traditional disaster recovery metrics – more so than looking at recovery time.

Faster recovery point objective part of backup evolution
Discover how data backup products allow for a lower recovery point objective (RPO) and recovery time objective (RTO) to avoid long periods of downtime when restoring data.

What is the difference between RPO and RTO (from a backup perspective)?
Expert Pierre Dorion discusses the effects of RPO and RTO, which helps administrators to choose the optimal disaster recovery technologies and procedures for their shops.

A tutorial on disaster recovery and business continuity planning strategies for SMBs
In recent years, even smaller organizations can no longer to afford to be without a disaster recovery (DR) plan. Learn disaster recovery and business continuity planning strategies for SMBs in this tutorial.

The importance of a service-level objective
Explore the key elements of a service-level objective (SLO) and why organizations should implement an SLO to help them return to operation when a disaster strikes.

Data restoration in less than 15 minutes
Recovery-in-place is just one of the technologies that allow for faster data restoration, but it is not flawless. Find out how to achieve sub-15 minute recovery times.

Trending Terms
recovery point objective
disaster recovery plan
RTA
business impact analysis
MTPOD
DRaaS

Writing for Business
The point of disaster recovery is the same for both large enterprises and _________ need to stay in business.
a. SMBs: They
b. SMBs; they
Answer


February 16, 2017  8:57 PM

ChatOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
ChatOps, DevOps, Slack

ChatOps is the use of chat clients, chatbots and real-time communication tools to facilitate how software development and operation tasks are communicated and executed. Continued…

Quote of the Day

“ChatOps tools are becoming systems of record for IT operations in mainstream organizations, particularly in distributed workforces.” – Beth Pariseau

Learning Center
I’m a software tester — where can I find a primer on DevOps basics?
It’s easy to see why testers might need a primer on DevOps basics. Expert Gerie Owen has guidance on navigating the new and complicated DevOps arena.

ChatOps is a new software testing strategy for DevOps teams
Take advantage of a new software testing strategy and get involved in ChatOps — a group of people and tech focused on solving production problems.

Using ChatOps to streamline DevOps workflow
ChatOps, a practice that focuses on conversation-driven development, has proved invaluable to DevOps by improving workflow and documentation, as well as increasing transparency.

ChatOps tools the new interface of IT operations
From notification tools to chatbots capable of executing commands, ChatOps offers a centralized, documented, flexible way for IT teams to work together.

ChatOps puts code execution into the conversation
ChatOps brings the configuration and change management visibility of DevOps right into IT communication channels. Tools are ready to integrate ChatOps into your data center.

Trending Terms
DevOps
GitHub
chatterbot
collaboration platform
social coding
Slack software

Writing for Business
Management chose Slack to encourage communication ________ the company’s marketing team and its sales team.
A. between
B. among
Answer


February 15, 2017  5:38 PM

serverless computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
IaaS, PaaS

Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services. Continued…

Quote of the Day

“It’s always been black magic how you distribute infrastructure costs, even in the data center among applications. It’s an advantage for serverless from a business perspective.” – Aater Suleman

Learning Center
Serverless deployment spells fresh opportunities for IT ops
Serverless deployment will become a tool for IT ops pros to offer developers alongside traditional infrastructures.

Serverless computing helps enterprises reduce cloud resource worries
Enterprises are embracing serverless computing due to its reliability and cost efficiency, using options such as AWS Lambda, Google Functions and Azure functions.

The outlook for cloud computing 2017? Lower costs and more options
In cloud computing 2017, there will be less — like serverless computing and lower prices — as well as more, like containers, analytics and storage

Public cloud vendors jump on serverless computing bandwagon
Serverless computing platforms, such as AWS Lambda, offer great potential as providers jump on the bandwagon — but proceed with caution.

Serverless showdown: Microsoft Azure Functions vs. AWS Lambda
Compare Microsoft Azure Functions vs. AWS Lambda pricing, as well as capabilities for containers, triggers and more.

Trending Terms
event driven architecture
AWS Lambda
event handling
PaaS
NoOps
IaaS
composable infrastructure

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
A. irregardless
B. regardless
Answer


February 14, 2017  7:19 PM

Ada Lovelace

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Ada Lovelace", Programming

Augusta Ada King, Countess of Lovelace, was an English mathematician who is credited with being the first computer programmer. Continued…

Quote of the Day

“The Analytical Engine weaves algebraic patterns, just as the Jacquard loom weaves flowers and leaves.” – Ada, Countess of Lovelace

Learning Center
How many SDN programming languages should I know?
Trying to decide which SDN programming languages to learn? Network engineer Will Murrell suggests focusing on Python, Java and NETCONF.

The advantages of turning Agile pair programming into pair coaching
Agile pair programming has a successor: pair coaching. Expert Yvette Francino explores the benefits of pair coaching in an Agile environment.

Ada Lovelace Day – raising awareness of women’s achievements in IT
With a programming language named after her, the influence of the world’s first computer programmer, Ada Lovelace, has spread much farther than her fame.

Pair programming: Two people, one computer
Pair programming is a practice which has been shown to improve software quality when done well. In this tip, SSQ site editor explores the pros and cons of pair programming and shares some tips for success for this Extreme Programming technique.

Quiz time: Popular programming language list shows changes at the top
Test yourself to see if you know which popular programming language sits atop the tech world. Hint: It’s not the same one as a year ago.

Trending Terms
Ada
Analytical Engine
Difference Engine
pair programming
pseudocode

Writing for Business
Leet is a simple kind of code that humans can read, ______ with some difficulty.
A. all be it
B. albeit
Answer


February 13, 2017  4:39 PM

CISO

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
CISO, security awareness, Security Event Management

The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats. Continued…

Quote of the Day

“I think it’s important for the new administration to challenge the way things have been done. Still, it’s equally important at least to consider the advice from those who have spent time on the frontlines.” – Steven Chabinsky

Learning Center
Trump tells White House cybersecurity officer, ‘You’re fired’
President Trump has reportedly fired the White House CISO, who is the cybersecurity officer in charge of preventing staff from being hacked.

Role of CISO: FICO enlists CISO in security product management
In her role of CISO at FICO, Vickie Miller spent years looking at screens as the head of its information security program. Now she is helping with services.

CISO job description: Business function more than IT
The CISO job description is always up for debate. Is it moving beyond IT to influence broader security and risk management initiatives?

How do chief data officers affect the role of the CISO?
As chief data officers become more prevalent in organizations, other c-level roles are likely to change. Here’s what you need to know about CDOs.

What should candidates expect in interviews for CISO jobs?
Candidates preparing to interview for CISO jobs can expect to be asked certain questions. Here’s what they should be ready to answer.

Trending Terms
operational risk
security awareness training
Jericho Forum
security event
CSIRT

Writing for Business
Today’s CISO needs interpersonal skills in order to _________ others in the boardroom to support their cybersecurity vision.
A. convince
B. persuade
Answer


February 10, 2017  8:24 PM

candidate relationship management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Candidate Relationship management, IT talent, Talent acquisition, Talent management software

Candidate relationship management is a systematic approach to proactively building, filling and maintaining a company’s talent pipeline for just-in-time recruiting. Continued…

Quote of the Day

“Features to watch for when vetting candidate relationship management systems include solid user manuals and support, robust reporting and follow-up functionality — the ability to see when a person was last contacted.” – Derina Adamczak

Learning Center
How HR can improve the candidate experience in recruitment
The candidate experience in recruitment is an HR trend that has larger implications for the company. Here’s what it is and how to improve it.

Candidate relationship management tech fills recruitment black hole
Learn how recruitment leaders at General Electric and CH2M Hill engage passive candidates through candidate relationship management technology.

Find, keep and grow IT talent
IT specialists with well-rounded expertise in emerging technologies are vital to any business. How do you get recruitment right?

How HR can use CRM as a model for workforce analytics
Read why one expert thinks CRM practices like sentiment analysis and marketing automation can help HR steer a course for workforce analytics.

The four pillars of talent management systems: A solid HR foundation
Discover the four components, or ‘pillars,’ of talent management systems: recruiting, performance management, corporate learning and compensation management.

Trending Terms
talent pipeline
talent management software
candidate experience
passive candidate
e-recruiting

Writing for Business
Since a candidate relationship management system is flexible, there are better tools for _________ communication and a lot of ways to segment candidates.
A. long-term
B. long term
Answer


February 9, 2017  4:23 PM

HIPAA Security Rule

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

The Security Standards for the Protection of Electronic Protected Health Information, commonly known as the HIPAA Security Rule, establishes national standards for securing patient data that is stored or transferred electronically. Continued…

Quote of the Day

“The HIPAA Security Rule mandates risk assessments, but many small medical practices fail to perform those assessments despite their availability online.” – Reda Chouffani

Learning Center
Five reasons small medical practices are vulnerable to cyberattacks
Small medical practices are often more vulnerable to cyberattacks due to limited security budgets and a failure to perform risk assessments.

Requirements for HIPAA compliance: The key channel partner challenges
Channel partners face a number of challenges when working with clients in the highly regulated healthcare market.

Should healthcare organizations follow the NIST guidelines for HIPAA?
NIST guidelines aren’t legally necessary for HIPAA covered entities to comply with, but find out why it’s still a good idea to follow them.

Wearable health technology and HIPAA: What is and isn’t covered
With wearable health technology tracking a person’s every move and heartbeat, some experts are concerned by what’s not covered by HIPAA, while others don’t see a threat.

HIPAA compliance services a double-edged sword
HIPAA compliance services can offer lucrative business opportunities to MSPs — as long as they know what they’re getting into.

Trending Terms
personal health information
Office for Civil Rights
Health and Human Services
HIPAA Privacy Rule
regulatory compliance

Writing for Business
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: