Word of the Day: Tech Definitions from WhatIs.com


May 19, 2017  7:55 PM

Net Neutrality (open internet)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Net Neutrality

Net Neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source. Continued…

Quote of the Day

“The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network.” – Russ White

Learning Center
Net neutrality explained: The idea is simple, but appearances deceive
When it comes to net neutrality explained, there’s more to it than just treating every packet the same.

Net neutrality law: Much ado about nothing?
President Drumpf’s free-market pick for the FCC might dismantle net neutrality law, but some industry watchers say that’s not such a big deal.

In aftermath of FCC privacy rules repeal, uncertainty, ironies abound
ISPs stand to make billions from the rollback of FCC privacy rules, but does the move hurt our success in the data economy? Also: brain-computer interfaces.

Does Internet neutrality shake up IoT plans?
The Internet of things is generating more data, but what happens when Internet neutrality affects how that information is received? Find out how Net neutrality challenges IoT.

Why SDN and NFV thinkers should care about net neutrality
Now that a circuit court struck down net neutrality rules, will SDN and NFV be used as tools to create an anti-competitive Internet?

Trending Terms
net bias
two-tiered Internet
common carrier
edge provider
zero rating
telecom carrier

Writing for Business
Telecom carriers are increasingly making a ______ into cloud services.
a. segway
b. segue
Answer

May 17, 2017  6:41 PM

bill of materials (BoM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Bill of Materials, Manufacturing

A bill of materials (BoM) is a list of the parts or components that are required to build a product. Continued…

Quote of the Day

“Engineering and manufacturing must work together to be sure that their separate, but related versions of the BOM are always in sync and up to date.” – Dave Turbide

Learning Center
What’s holding back growth of 3D printing and additive manufacturing?
Whether 3D printing and additive manufacturing can grow beyond small-scale manufacturing depends on the industry getting together on machines, standards and education.

Are both an engineering bill of materials and a manufacturing BOM needed?
Manufacturers need an engineering bill of materials and a manufacturing bill of materials for any given product. Here’s why.

Use SAP MRP to effectively plan production and procurement
The SAP MRP module can optimize production or procurement plans. An expert explains how to use it for consumption-based planning and material requirements planning.

Manufacturing tips for Kanban production control and BOM management
Discover how Oracle E-Business Suite supply chain management (SCM) software helps manufacturers with Kanban setup and production control. Find out how Oracle SCM software can improve bill of materials (BOM) management.

Manufacturing requirements planning: The four critical questions answered
Read a key chapter in the recently revised and updated “Orlicky’s Material Requirements Planning,” considered by some to be a landmark book by one of the pioneers of MRP.

Trending Terms
manufacturing process management
engineering bill of materials
computer-aided design
material requirements planning
supply chain management

Writing for Business
The user found that the application worked well if she could get the phone view ________ with the package barcode.
a. orientated
b. oriented
Answer


May 16, 2017  4:18 PM

infosec

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Infosec

Infosec (information security) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Continued…

Quote of the Day

“[Trump’s executive order] is not a plan to fix the federal government’s cybersecurity challenges. Instead, it’s a directive to each agency to implement the NIST framework to assess the agency’s cyber risks and create plans to mitigate them.” – Leo Taddeo

Learning Center
Trump cyber executive order focuses on cyber-risk management
The directive forces agency and department heads to demonstrate the degree to which they have strategically viewed cybersecurity risk.

Six keys to creating strong data-security measures
The need for effective data-security measures is more critical than ever before. Here’s why, as well as six information-protection best practices.

Tabletop cybersecurity exercises essential to infosec training
As companies stare down seemingly endless sources of data threats, tabletop cybersecurity exercises are a great way to kick start infosec training efforts.

How infosec professionals can improve their careers through writing
Infosec professionals should look to raise their profiles and reputations. Expert Joshua Wright explains how infosec careers can benefit from writing.

Mobile endpoint security: What enterprise infosec pros must know now
Achieving mobile endpoint security can be tough. This essential guide walks security pros through its many aspects.

Trending Terms
risk management
information assets
confidentiality, integrity and availability
defense in depth
ISO 27001
Federal Information Security Information Act

Writing for Business
The security of clients’ personal information is of _______ importance.
a. upmost
b. utmost
Answer


May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued…

Quote of the Day

“Ransomware attacks happen, but the important thing is to minimize the impact and demonstrate a timely recovery.” – Mike O. Villegas

Learning Center
Ransomware protection best served by backing up your data
Good data storage practices and effective data backup are the best approaches when it comes to offering ransomware protection in your company.

Ransomware threat continues to evolve, defense needs to catch up
Ransomware threat abounds, but RSA Conference 2017 speakers say victims should avoid paying ransoms and weigh their options to access critical data.

Why healthcare ransomware attacks are a growing threat to health IT
Healthcare ransomware attacks plagued hospitals in 2016: experts predict the threat will rise in 2017 due to outdated systems and lax security practices.

Five ways to prevent a ransomware infection through network security
A ransomware infection can be stopped in its tracks by strong network security. Here are five simple steps enterprises can take to bolster their networks.

Cheap ransomware as a service arrives for malicious actors
The Karmen ransomware as a service offers a very low price and interesting features for the enterprising malicious actor.

Trending Terms
cyberextortion
cryptoperiod
malware
encryption
doxware
infosec

Writing for Business
Ransomware hasn’t been in the news for _______ but it seems to be making a comeback.
a. a while
b. awhile
Answer


May 12, 2017  6:20 PM

privilege creep

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Identity & Access Management

Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. Continued…

Quote of the Day

“Manually trying to manage a large number of users’ privileges is a time-consuming and resource-draining process and will lead to mistakes and oversights.” – Michael Cobb

Learning Center
Enlightened shadow IT policy collaborates with users
A shadow IT policy that manages risk has to change with the times, as cloud services offer users easy access to necessary apps.

Shadow apps in the cloud threaten IT data governance
Deploying cloud apps can take far less time than going through IT to do the same work on premises. But these shadow apps cause IT data governance issues.

Beyond shadow IT risks, opportunity awaits
Shadow IT risks pose a threat to the enterprise, but, when properly managed, the use of unsanctioned apps can lead to new cloud computing innovations.

Build a shadow IT strategy all departments will love
To build a successful shadow IT strategy, IT pros must remember that, in many cases, shadow apps meet a business need that existing IT systems don’t.

Shadow IT cited as reason why some firms lack formal cloud strategy
New research from VMTurbo suggests firms are using cloud, even if they claim not to have a formal private or public deployment plan in place.

Trending Terms
feature creep
identity access management (IAM) system
access governance (AG)
access recertification
privilege escalation attack

Writing for Business
I’ve saved the folder to Dropbox and will send the link to _________.
a. he and Charles
b. him and Charles
c. Charles and he
d. Charles and him
Answer


May 10, 2017  4:17 PM

one-time password token (OTP token)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
multifactor authentication, OTP, Password authentication

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. Continued…

Quote of the Day

“Strong authentication methods typically involve dynamically generated OTPs or certificate- and context-based authentication.” – Dan Sullivan

Learning Center
Multifactor authentication: A buyer’s guide to MFA products
Learn about the evolution of multifactor authentication technology, as well as how to procure and buy the right MFA products for your organization.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long term solutions to the challenges of effective and secure authentication.

Why mobile two-factor authentication is better than biometrics
By adding a second criterion to device access, mobile two-factor authentication makes it much more difficult for hackers to access users’ devices.

Authentication in the cloud: Are more open standards the answer?
Cloud security expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help ensure secure user authentication in the cloud.

Trending Terms
key fob
multifactor authentication
two-factor authentication
Google Authenticator
FIDO

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


May 9, 2017  6:46 PM

OpenShift

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
OpenShift, Red Hat

OpenShift is RedHat’s cloud development Platform as a Service (PaaS). The free and open source cloud-based platform allows developers to create, test and run their applications and deploy them to the cloud. Continued…

Quote of the Day

“OpenShift spans a broad swath of new technologies, such as containers, software-defined storage and software-defined networks, but also requires skills in administering VMs and server hardware in on-premises deployments.” – Beth Pariseau

Learning Center
Signs point to cloud future at Red Hat Summit 2017
At Red Hat Summit 2017, the open source software company made overtures toward cloud computing.

Delving into the container-based Red Hat PaaS, OpenShift
The Red Hat PaaS, OpenShift, combines Docker and Kubernetes features to provide app dev teams container management and orchestration capabilities.

IT pros strive to embrace OpenShift container portability advances
Red Hat and Amazon Web Services focus on container portability in OpenShift collaboration, signaling a multicloud and hybrid cloud roadmap.

Red Hat OpenShift opens doors for container-based mobile app dev
Red Hat OpenShift and AWS announced a new collaboration at the Red Hat Summit that could make mobile app deployment easier for developers.

Create a PaaS model for application portability
A PaaS model offers operational simplicity, but can present lock-in risks. Evaluate these four options to make your PaaS environment portable.

Trending Terms
Red Hat
PaaS
open source
cloud computing
Cloud Foundry

Writing for Business
Open source describes any software whose source code is in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license
Answer


May 8, 2017  1:34 AM

Signaling System 7 (SS7)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Networking, Security

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network. Continued…

Quote of the Day

“Everyone’s accounts protected by text-based two-factor authentication, such as bank accounts, are potentially at risk until the FCC and telecom industry fix the devastating SS7 security flaw.” – Rep. Ted Lieu (D-Calif.)

Learning Center
SS7 vulnerability allows attackers to drain bank accounts
An SS7 vulnerability was exploited to steal money from German bank accounts. Plus, an Intel AMT flaw exposes millions to security risk and more.

Can eavesdropping over the SS7 protocol be prevented?
Researchers have found the SS7 protocol used for phone communications is insecure. Can the threat be mitigated?

Security flaw exposes billions of mobile phone users to eavesdropping
Hackers, fraudsters, rogue governments and unscrupulous commercial operators are exploiting flaws in the architecture of the mobile phone signaling system known as SS7.

Mobile phone users at risk as hackers bug and track victims
An investigation by an Australian TV show demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements.

Trending Terms
PSTN
out-of-band signaling
man-in-the-middle attack
SS7 attack
SIGTRAN
in-band signaling

Writing for Business
The seminar covered an introduction to the _________ wireless protocols.
a. principal
b. principle
Answer


May 5, 2017  9:00 PM

behavior-based security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Breach detection, Phishing, Security

Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued…

Quote of the Day

“The behavior-based security systems find things that were previously hidden — like something a software engineer is using or connecting to that is a bit sketchy.” – Niel Nickolaisen

Learning Center
As long as the workforce is human, IT security education will fall short
The human condition pretty much guarantees that IT security education will fail to protect the enterprise, CTO Niel Nickolaisen said.How a hybrid whitelisting-blacklisting approach can help enterprises
Application whitelisting isn’t enough. Here’s why a hybrid whitelisting-blacklisting approach is best for enterprise security.

User behavioral analytics tools can thwart security attacks
InfoSec pros purchasing user behavioral analytics tools need to consider key features, deployment strategies and reasonable performance expectations.

Behavioral threat assessment means real-time threat detection
A behavioral threat assessment tool that provides real-time threat detection may be just what your enterprise security system needs now.

Tackle endpoint defense issues to obtain the best endpoint security
We’re well past a blind reliance on antivirus scanning at the endpoint, but there’s also not yet consensus on which next steps will bring are a must and which are just nice to have. Here’s your guide through the endpoint thicket.

Trending Terms
behavior whitelisting
phishing
malware
breach detection system
user behavior analytics
adaptive security

Writing for Business
Most major security breaches ____________ human error.
a. can be attributed to
b. are due to
Answer


May 4, 2017  6:54 PM

walking skeleton

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agile, Solution Testing, Unit testing

A walking skeleton, in the context of software development, is a minimal initial implementation of an application’s architecture that includes and connects the basic components of the system. Continued…

Quote of the Day

“By using test-driven development and continuous integration effectively, you can ensure not only your application is high quality, but your unit tests are high quality as well.” – Matt Heusser

Learning Center
Effective test-driven development and continuous integration
In this tip, Matt Heusser explains maintenance considerations when using test-driven development and continuous integration in a development environment.

Five things to know about the future of microservices and IoT
There’s a perfect storm brewing in IoT that will push microservices into new and traditional industries. The benefits are high and risks are low.

Use Agile software testing principles to plan your tests
Two Agile software testing approaches — testing quadrants and the test automation pyramid — will put you on your way to creating a solid strategy to fully test your applications.

Test your knowledge on code refactoring
Do you know how to refactor effectively? This quiz will put your knowledge of code refactoring to the test.

Using API Blueprint and Dredd for stronger, test-driven documentation
Zachary Flower lays out the benefits of test-driven development and explains how API Blueprint and Dredd can help.

Trending Terms
source code
test-driven development
unit testing
refactoring
agile software development
continuous integration

Writing for Business
Test coders will develop scenarios and exercises to test new code _________________
a. (after each unit is written).
b. (after each unit is written.)
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: