Word of the Day: Tech Definitions from WhatIs.com


February 1, 2017  4:23 PM

smart hard hat

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Embedded devices, Wearable devices

A smart hard hat is a rigid protective helmet with embedded sensors. The hat provides workers in construction and related industries with additional safety controls made possible through technology. Continued…

Quote of the Day

“Engineering and construction environments see great potential in wearables, where people such as warehouse technicians can use wearables to receive instant alerts about potential hazards, while keeping hands and eyes independent of their devices.” – Kelly M. Stewart

Learning Center
Look to the future of the wearable technology trend
The wearable technology trend has caught on with smartwatches and virtual reality headsets. This tech has the potential to break through the enterprise wall.

What’s the next big thing in the wearable device market?
The latest wearable devices aim to be functional and fashionable. From watches and glasses to jeans and suits, find out what’s next for the wearable device market.

Personal safety devices: A unique opportunity for wearable technology
Personal safety devices that track user location and send alerts for emergency assistance stand as a unique opportunity for the wearable technology market.

Seven ways to manage and secure business wearables
Wearable devices will be flying off the shelves in 2015, and IT admins need to figure out how to use EMM to manage business wearables.

Augmented reality technology still ‘experimental’ in the enterprise
Uses for augmented reality technology are few and far between right now, but the potential is growing. Learn where the AR market stands today and how companies can plan for this emerging technology.

Trending Terms
embedded device
smartwatch
active sensor
wearable computer
smart antenna

Writing for Business
Construction workers can use smart hard hats to detect _______ dangers and monitor their conditions and surroundings.
A. every day
B. everyday
Answer

January 31, 2017  2:26 PM

building information modeling (BIM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
3D model, computer aided engeneering

Building information modeling (BIM) is an approach to design engineering that combines traditional computer aided design (CAD) with 3D modeling. BIM software integrates visual information with data about specifications, materials, functionality and maintenance to provide all project participants with a unified view of the project and all its components. Continued…

Quote of the Day

“It’s critical that designers can adopt a BIM approach where all the key stakeholders in a build can collaborate efficiently and effectively during the design phase.” – Jukka Nyman

Learning Center
How building information modelling is changing the construction industry
The Cabinet Office’s Government Construction Strategy says that by 2016, “collaborative 3D building information modelling will be required on all government projects”. What is BIM and how should it be done?

Sustainability technology solutions: Green ERP, building modeling
Solution providers that are interested in the sustainability technology sector are finding good potential around green ERP technology and business modeling consulting.

Plumbing goes digital — smart cities need BIM
Progman is a provider of Mechanical, Electrical and Plumbing (MEP) design software used in Building Information Modeling (BIM) from Turku in Finland.

Virtual reality comes of age in manufacturing
Will there be virtual reality headsets in the living room by the end of 2015? Perhaps not, but Ford and BAE Systems are putting virtual reality to work.

Combining DCIM and BIM tools for effective datacenter management
If datacenter IT equipment and datacenter building was combined, building and cooling could be tailored to increase efficiency.

Trending Terms
CAD
3D modeling
digital manufacturing
home building software
metadata

Writing for Business
BIM can create multiple performance ________ that incorporate energy performance, social impact and environmental performance into a project’s framework.
A. analyses
B. analysis
Answer


January 30, 2017  5:03 PM

medical device class

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
FDA, HIPPA, medical device regulation, medical devices

Medical device class (MDC) is a regulatory category defined by the United States Food and Drug Administration (FDA). In the United States, the FDA has the authority to regulate medical devices before and after they reach the marketplace. Continued…

Quote of the Day

“In today’s world of medical devices that are connected to a hospital’s network or even a patient’s own internet service at home, we see significant technological advances in patient care and, at the same time, an increase in the risk of cybersecurity breaches that could affect a device’s performance and functionality.” – Suzanne Schwartz, M.D.

Learning Center
FDA issues medical device cybersecurity guidance for manufacturers
Medical device cybersecurity gets new FDA guidance; plus, Obama announces U.S. retaliation to Russia’s election hacks and more.

St. Jude Medical finally patches vulnerable medical IoT devices
Vulnerable medical IoT devices were patched after St. Jude Medical insisted they don’t exist. Plus, the Email Privacy Act is reintroduced and more.

Understanding FDA guidance on medical device cybersecurity
Medical device manufacturers and hospitals should pay attention to the new FDA guidance on cybersecurity of medical device. Expert Mike Villegas explains what the guidelines mean.

3D printing in healthcare blends medical and consumer devices
Certain uses for 3D printing in healthcare, such as hearing aids, are oversaturated, but the technology is finding its place in custom consumer devices.

Malware detection tool tackles medical device security
University of Michigan researchers designed WattsUpDoc, an embedded system security tool designed to detect malware in hospital equipment and improve medical device security.

Trending Terms
IoMT
medical 3-D printing
medical body area network
HIPAA covered entity
FDA

Writing for Business
The FDA reclassified sutures as Class II medical devices in the early ______.
A. 1990’s
B. 1990s
Answer


January 27, 2017  5:10 PM

supply chain visibility (SCV)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Supply chain visibility (SCV) is the ability of parts, components or products in transit to be tracked from the manufacturer to their final destination. The goal of SCV is to improve and strengthen the supply chain by making data readily available to all stakeholders, including the customer. Continued…

Quote of the Day
“Manufacturers need supply chain visibility software to stay ahead of issues in the supply chain. This visibility is even more crucial in ever-changing global manufacturing environments.” – Christine Cignoli

Learning Center
Blockchain not a panacea for supply chain traceability, transparency
The hype around blockchain says it’s the perfect tool to ensure supply chain traceability and transparency. We asked the experts to weigh in.

Achieving strong supply chain visibility
Read advice on why ERP systems alone can’t provide supply chain visibility. Learn how supply chain visibility is changing.

The changing face of supply chain visibility
Learn how to prove the value of supply chain visibility and how to build a business case for projects.

Deciding whether to buy supply chain visibility software
Thinking of buying supply chain visibility software? Learn more about what to look for, and how a variety of vendors and product categories tout the benefits to supply chain visibility software.

Quick payback supply chain visibility projects
Rather than try for end-to-end visibility across the supply chain, experts recommend defining the first project around a primary pain point and scaling future efforts from there.

Trending Terms
planogram
inventory turns
supply chain
supply chain risk management
distribution channel
traceability

Writing for Business
Supply chain visibility can help manufacturers in managing _______ periods of inbound and outbound activity.
A. peak
B. peek
C. pique
Answer


January 26, 2017  6:46 PM

personally identifiable information (PII)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Personally identifiable information (PII) is any data that could potentially identify a specific individual. Any information that can be used to distinguish one person from another and can be used for de-anonymizing anonymous data can be considered PII. Continued…

Quote of the Day

“Personally identifiable information can live outside the databases on corporate networks, and it needs to be locked down so attackers can’t get it.” – Kevin Beaver

Learning Center
PrivacyCon: Tech’s assault on (obliteration of?) consumer privacy
The FTC PrivacyCon event grappled with the question of how to reap the benefits of technology while protecting consumer privacy.

Uncover PII security risks with free tools
PII security is critically important in the enterprise. Learn about some free tools that IT administrators can use to locate and lock down SSN, credit card information and more.

How to keep personally identifiable information out of access logs
Learn how to prevent PII and internal IP addresses from being exposed in server access logs.

IRS breach shows the importance of PII security
A recent IRS breach exposed tax returns and filings of 100,000 accounts and demonstrated the importance of PII security.

Why your HR department needs PII security — now
Keeping personally identifiable information safe should be a priority for HR, but that’s often not the case. Here’s why PII security should be addressed today.

Trending Terms
privacy impact assessment
synthetic identity theft
OPSEC
de-anonymization
unstructured data
PIFI

Writing for Business
A company needs to have an overall plan to protect PII and secure _________ sensitive data.
A. their
B. its
Answer


January 25, 2017  8:50 PM

MEMS

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Internet of Things, MEMS

A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components. Continued…

Quote of the Day

“IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS) and the internet.” – Warwick Ashford

Learning Center
UK more than doubles funds to build internet of things
UK government more than doubles funding for technology companies making devices that communicate over the internet.

Smart dust could be magic for IT
“Smart dust” devices are tiny wireless sensors that can detect everything from light to vibrations. Thanks to recent manufacturing breakthroughs, applications could range from monitoring temperature and humidity or tracking enemy movements in a military operation.

Asean countries consider IoT for smart farming
Malaysia is leading the way when it comes to using internet of things technologies to improve agriculture.

Plexxi integrates SDN with Calient’s 3D MEMS optical switch
By integrating with Calient’s 3D MEMS optical switch, Plexxi has added dynamic, any-to-any interconnection to its software-defined networking technology.

2013 networking industry outlook: Network fabrics can’t kill spanning tree
451 Research’s Erica Hanselman makes predictions for the networking industry in 2013. Network fabrics won’t kill spanning tree; enterprises will look at Ethernet exchanges for hybrid cloud.

Trending Terms
smart dust
MUMPs
piezoelectricity
control network
DARPA
mechatronics

Writing for Business
Advantages of MEMS sensors are their size and their ability to be more closely integrated with their associated _______ devices.
A. electronic
B. electric
Answer


January 24, 2017  10:17 PM

hybrid cloud storage

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud storage, Hybrid cloud

Hybrid cloud storage is an approach to managing storage that uses both local and off-site resources. Continued…

Quote of the Day

“By offering lower costs, higher performance and reduced data loss, hybrid cloud helps some organizations optimize their tiered storage systems.” – David Linthicum

Learning Center
Breaking down the costs of cloud storage
The costs of cloud storage are tricky to navigate and can add up quickly. Take a closer look at how location, capacity and service types accrue costs.

Hybrid cloud 101: Using the cloud as a storage tier
We look at what’s possible when it comes to hybrid cloud, what types of data and what hybrid cloud architectures can combine on-premise and cloud storage capacity.

How to avoid common hybrid cloud implementation mistakes
Choosing the wrong public cloud and on-premises storage can have disastrous consequences, but these hybrid cloud implementation mistakes are easy to avoid.

Hybrid cloud implementation preparation checklist
Before undertaking a hybrid cloud implementation, ensure your on-premises environment is fully prepared using this comprehensive checklist.

Hybrid cloud benefits driving future of cloud storage
Storage vendors are offering products that acknowledge hybrid cloud benefits by accommodating on-premises storage but also allow for access to data stored externally.

Trending Terms
Eucalyptus
application program interface (API)
cloud storage appliance
tiered storage
hyper-hybrid cloud

Writing for Business
When using cloud storage to ________ local storage, an important factor to consider is how data will be transported to the cloud storage provider.
A. complement
B. supplement
Answer


January 23, 2017  8:05 PM

Affordable Care Act

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Affordable Care Act, HIPAA

The Affordable Care Act (also known as ACA or Obamacare) is legislation passed in 2010 that changed how Americans enroll in and receive healthcare coverage. Continued…

Quote of the Day

“As the nation moves past a divisive election season, we must continue working together to build a better healthcare delivery system.” – Russell Branzell

Learning Center
Experts say how Trump presidency might affect the future of health IT
Health IT experts discuss the future of health IT under the Trump administration. They offer up predictions and reassurances for the future.

John Sculley: optimize transaction cycle for pharmaceuticals
The transaction cycle for prescription drugs can be optimized by using collaborative cloud technology, according to former Apple and Pepsi CEO John Sculley.

Why the ACA makes information security in healthcare more challenging
Information security in healthcare settings is a big challenge already, but expert Joseph Granneman says the ACA’s focus on data storage will only make it tougher.

How predictive analytics in healthcare can lower readmissions
Health systems have had a few years now to learn how to apply predictive analytics in healthcare to combat the problem of readmissions.

How the Supreme Court’s Affordable Care Act ruling hits the HIT world
HIT leaders learn what to do next after the U.S. Supreme Court’s Affordable Care Act ruling.

Trending Terms
CHIME
ONC
HIPAA
Office for Civil Rights
US Dept. of Health and Human Services

Writing for Business
Under the ACA, there are tax credits for individuals, families, and small businesses in order to _____ that insurance is affordable for everyone.
A. assure
B. ensure
C. insure
Answer


January 20, 2017  6:21 PM

change control

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Change control management, Change management

Change control is a systematic approach to managing all changes made to a product or system. The purpose is to ensure that no unnecessary changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently. Within information technology (IT), change control is a component of change management.

The change control process is usually conducted as a sequence of steps proceeding from the submission of a change request. Typical IT change requests include the addition of features to software applications, the installation of patches, and upgrades to network equipment. Continued…

Quote of the Day

“Change is scary; we get used to one way, and we know that changes normally don’t go smoothly. In the IT world, both IT staff and end users get upset when things change.” – Adam Fowler

Learning Center
Real-life change management examples prove it’s harder than it looks
These change management examples illustrate the dangers of change, the importance of communication and the options IT shops have to get it right.

Could IT change control have prevented an IT deployment failure?
IT change control fails for common reasons, including fear of the unknown. Bring IT configurations into spec with these practical guidelines.

Maintaining compliance in a world of constant change
Four steps information security practitioners can take to ensure their compliance efforts are maintained.

Neglecting change control can kill a DR plan
This tip discusses the impact of change control (or lack thereof) on disaster recovery and offers some best practice information.

Using control change management to improve attack resistance
Learn how control change management can free your enterprise from the “widget mentality” — and ensure better attack resistance.

Trending Terms
organizational change management
change data capture
application lifecycle management
change management
change request
feature creep

Writing for Business
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
A. continual
B. continuous
Answer


January 19, 2017  4:39 PM

Cloud Security Alliance (CSA)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud Security

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the ability of cloud technologies to secure other forms of computing. The industry group also provides security education and guidance to companies implementing cloud computing and helps vendors address security in their software delivery models. CSA membership is open to any interested parties with expertise to contribute to the security of cloud computing.

The CSA leads a number of ongoing research initiatives through which it provides white papers, tools and reports to help companies and vendors secure cloud computing services. The CSA GRC Stack, for example, provides a toolkit for assessing private and public clouds against industry-established security best practices. The CloudAudit project seeks to simplify the process of gathering audit data by creating a standard way for cloud providers to communicate how they address security, governance and compliance.

The CSA Security, Trust & Assurance Registry (STAR) program for security assurance in the cloud seeks to reduce or eliminate the per-relationship cost for the provider and customer and increase the consistency of evaluations from assessor to assessor. The basic premise of STAR is that a service provider can voluntarily undertake an objective assessment of its own environment, publish it to a registry and allow the results to be viewed by existing, new, and potential customers. Continued…

Quote of the Day

“Cloud customers can be tempted to ignore isolation attacks. This is problematic in the face of a situation like Flip Feng Shui.” – Ed Moyle

Learning Center
How the Flip Feng Shui technique undermines cloud security
Flip Feng Shui leverages Rowhammer and memory deduplication to exploit hypervisors. Here’s what enterprises need to know about it.

CSA cloud metrics validate perceptions on cloud computing risk
Cloud Security Alliance recently released a study revealing in-depth data on cloud adoption and influences. The CSA cloud market maturity study also examined cloud business risk.

Can the Cloud Security Alliance help with comparing cloud providers?
Cloud security expert Dan Sullivan explains how the Cloud Security Alliance’s Privacy Level Agreement for Europe v2 can help U.S. companies with comparing cloud providers.

An introduction to cloud computing security certifications
SearchCloudSecurity’s guide to cloud computing security certifications looks at the top vendor-specific and vendor-neutral cloud security certifications.

CSA Guide to Cloud Computing
In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA’s Top Threats Working Group.

Trending Terms
CloudAudit
Trusted Cloud Initiative
software-defined perimeter
STAR
CloudTrust Protocol
Cloud Controls Matrix

Writing for Business
The Cloud Security Alliance (CSA) has worked with European officials to support implementation of the ______ privacy laws and regulations.
A. Unions’
B. Union’s
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: