“The main driver for ‘shadow IT’ is the typically difficult, protracted and bureaucratic process of acquiring resources…Some CIOs only find out their organization uses Amazon Web Services when there is an AWS outage.” — Shlomo Swidler
Today’s WhatIs.com Word of the Day is shadow IT, an adjective that describes hardware or software within an enterprise that is not supported by the organization’s central IT department. Although the label itself is neutral, the term often carries a negative connotation because it implies that the IT department has not approved the technology or even worse — doesn’t even know that employees are using it.
“Given the emphasis that companies place on value propositions, you would think that they have been around since the dawn of business. Actually, a former McKinsey & Company consultant named Michael Lanning coined the term in a 1984 white paper.” — Jeff Thull
Today’s WhatIs.com Word of the Day is value proposition, a statement that clearly identifies what advantages a customer will receive by purchasing a particular product or service.
“How important is cloud computing? I would argue that it’s a sea change—a deep and permanent shift in how computing power is generated and consumed. It’s as inevitable and irreversible as the shift from steam to electric power in manufacturing, which was gaining momentum in America about a century ago.” — Andrew McAfee
Today’s WhatIs.com Word of the Day is sea change, a significant and/or systemic transformation. It’s a more mysterious way of describing IT transformation and has pretty much replaced paradigm shift or disruptive technology in the 2012 version of buzzword bingo.
“We believe that the chief data officer — separate from the chief information officer — will be one of the top critical hires in 2013. By 2015, coming up to 50% of the Fortune 100 will have a chief data officer. That’s up from 5% today.” — Shawn Banerji
Today’s WhatIs.com Word of the Day is Chief Data Officer, a C-level position whose main purpose is to maximize the value a company gets from the data it generates and maintains.
“WMS software directs the picking, replenishment and putaway of goods identified and tracked by an automated data collection system, typically bar codes and scanners. It takes orders — literally — from an ERP system and feeds back inventory and transaction data.” — David Essex
Today’s WhatIs.com Word of the Day is warehouse management system, a software application that supports the day-to-day operations in a warehouse.
“Exchange Server 2010 lets you run EMS commands as jobs. These jobs can run in the background, thereby letting the administrator work on other things while the job is being processed.” — Brien Posey”
Today’s WhatIs.com Word of the Day is Microsoft Exchange Management Shell (EMS).
“Oracle shops can get an array of Oracle products bundled together under one agreement and one bill, rather than a mishmash of complex licensing agreements for each product. The drawbacks are putting all your eggs in one basket and needing to make sure you negotiate the terms aggressively.” — Mark Fontecchio
Today’s WhatIs.com Word of the Day is Oracle Unlimited License Agreement (ULA), an arrangement in which an enterprise pays a single up-front fee to get as many licenses as they want for a specified set of Oracle products over a fixed time frame.
“Right: Create a title that makes the reader want to read your content. And make sure the content provides what the reader expects from your title.
Wrong: Create a title that makes the reader want to read your content. And then provide some content that may have some slight connection to the title.” — Ivy Wigmore
Today’s WhatIs.com Word of the Day is linkbaiting, the practice of luring readers to online content in hopes of a click or even better, an inbound link. Did you know that there are tools out there to help you with your linkbaiting? The really cool part is that the linkbait generator is (surprise) great linkbait. (It’s kind of like looking at a picture of a mirror inside a picture of a mirror inside a picture of a mirror!)
“A good example of where risk-based authentication is extensively used today is on banking websites. After a customer registers for access to his or her account, if he checks the account from a remote location not previously used to access the account or uses a system never used before, the risk-based authentication system recognizes this fact. ” — Randall Gamby
Today’s WhatIs.com Word of the Day is risk-based authentication, applying more rigorous standards for granting access when there is an indication that someone might not be who he says he is. You may have experienced risk-based authentication if you’ve ever accessed your bank account from another country and were asked more than the usual number of security questions. Common criteria for assessing risk includes geographic location, IP address and the status of antivirus software.
“The Open Networking Foundation, the nonprofit organization that promotes OpenFlow, is a who’s-who of networking and infrastructure heavyweights: Facebook, Google, Microsoft, Yahoo, Cisco Systems, Juniper Networks, HP, Citrix Systems, Dell, IBM, NEC and VMware.” — Lisa Sampson