Overheard: Word of the Day

A Whatis.com blog


November 19, 2013  1:56 PM

Word of the Day: leaky feeder



Posted by: Margaret Rouse
Technology

Overheard

“Setting up a wireless LAN is more of an art than a science.”
Mike Jude

Today’s WhatIs.com Word of the day is leaky feeder, a coaxial cable that has small sections of its copper shielding stripped away to allow radio frequency (RF) signals to escape. Leaky feeders, which act as extended antennas, are also called radiating cables. Leaky feeders are often used in structures with metal frameworks such as skyscrapers, tunnels, ships and planes to extend mobile coverage.  Continued…

Related Terms

coaxial cable
amplifier
wireless LAN
access point
802.11ac

Quiz Yourself

What does an antenna do?
a. converts radio-frequency fields into alternating current and vice-versa.
b. increases the voltage, current or power of a signal.
Answer

Related Reading

Ten questions to ask WLAN vendors when evaluating WLAN solutions
The wireless LAN (WLAN) has grown from a convenience to a complete networking solution.

New standards help administrators increase enterprise WLAN capacity
Combined, the new 802.11ac and 802.11ad standards will ultimately allow admins to increase enterprise WLAN capacity, offering amplified user density and higher data rates.

The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage.

November 18, 2013  1:43 PM

Word of the Day: fruit of a poisonous tree



Posted by: Margaret Rouse
Technology

Overheard

“Even if you own a network or are responsible for its security and maintenance, you may not have the unfettered right to watch what network users are doing.”Richard P. Salgado

Today’s WhatIs.com Word of the Day is fruit of the poisonous tree, a legal doctrine according to which any secondary evidence obtained indirectly through illicit means is inadmissible in court. Examples of such sources include evidence gained through eavesdropping, illegal wiretapping, coercive interrogations, unwarranted searches or improperly conducted arrests. Information obtained from those sources is inadmissible according to the law of exclusion.  Continued…

Related Terms

eavesdropping
electronic discovery
wiretap Trojan
government Trojan
hackerazzi

Quiz Yourself

What do you call the the destruction, alteration, or mutilation of evidence that may pertain to legal action?
a. spoliation
b. spoilation
Answer

Related Reading

ARMA 2013: Cloud, mobile-related e-discovery complications
In this Q&A with ARMA 2013 speaker Veeral Gosalia, learn how mobile devices and the cloud are complicating how organizations approach e-discovery strategy.

Guide to managing the e-discovery process
Although e-discovery can be complicated, time-consuming and expensive, it is necessary in order to avoid the costly fines associated with non-compliance.

Can You Hear Me Now? Gov’t. Surveillance and ‘Metadata’
Davis Scott blogs about the controversy surrounding U.S. government surveillance of the Internet and phone calls.


November 14, 2013  2:34 PM

Word of the Day: UE virtualization



Posted by: Margaret Rouse
Technology

Overheard

“With nonpersistent virtual desktops, a single disk image is shared among many users. As each user logs in, he gets a clone of the master desktop and then that clone is customized on demand with app virtualization or with user environment virtualization.”Brian Madden

Today’s WhatIs.com Word of the Day is user environment virtualization, the abstraction of personalized computer settings from an end user’s operating system and applications. User environment virtualization software allows desktop and application virtualization users to keep personalized settings — such as desktop wallpaper and browser bookmarks — even though the operating system and software applications come from a standardized template or golden image shared by everyone. These persistent settings can follow users from session to session and from one physical machine to another in a nonpersistent virtual desktop infrastructure. Continued…

Related Terms

VDI
nonpersistent desktop
persistent desktop
golden image
app virtualization
Microsoft UE-V

Quiz Yourself

What does the Infinite Monkey Theorem propose?
a. given infinite time, random input should produce all possible output.
b. the universe is partitioned to accommodate every possible outcome of an event.
Answer

Related Reading

Taking advantage of nonpersistent VDI for one-off applications
There are still uses for nonpersistent virtual desktops, especially when you are supporting specialized applications for a small number of employees.

How to handle peripherals support on virtual desktops
Learn how peripherals support is handled by the major VDI vendors.

Persistent VDI vs. non-persistent VDI and their effect on storage resources
Learn the difference between persistent VDI and non-persistent VDI and how they affect storage in terms of capacity and backup requirements.


November 13, 2013  2:39 PM

Word of the Day: rolling forecast



Posted by: Margaret Rouse
Technology

Overheard

“It’s no secret that the BYOA trend creates new security challenges. Internal applications typically rely on firewalls, but best practices for cloud-based services usually rely on secure passwords and encryption technologies.”Chris Moyer

Today’s WhatIs.com Word of the Day is rolling forecast, an add/drop process for predicting the future over a set period of time. Rolling forecasts are often used in long-term weather predictions, project management, supply chain management and financial planning. If, for example, an organization needs to anticipate operating expenses a year in advance, the rolling forecast’s set period of time would be 12 months. After the first month had passed, that month would be dropped from the beginning of the forecast and another month would be added to the end of the forecast. Because a rolling forecast window requires routine revisions, it is sometimes referred to as a continuous forecast or an iterative forecast. Continued…

Related Terms

BPF
predictive analytics
demand planning
fiscal year

Quiz Yourself

A rolling forecast budget uses a FIFO approach for time. What does FIFO stand for?
a. first in/first out
b. financial information/forecast ongoing
Answer

Related Reading

Rolling forecast model can improve usefulness of financial data
Should you adopt a rolling forecast model to replace slow and broken processes?  You won’t need a crystal ball to guess the answer.

Gartner Symposium forecast: Cloudy with a good chance of 3-D printing
This CIO Searchlight shares some predictions from the Gartner Symposium along with some innovation news from Disney.

Which budget technique is right for your organization?
Explore which approach to forecasting budget requirements meets your organization’s needs.


November 12, 2013  4:30 PM

Word of the Day: BYOA



Posted by: Margaret Rouse
Technology

Overheard

ChrisMoyer

“It’s no secret that the BYOA trend creates new security challenges. Internal applications typically rely on firewalls, but best practices for cloud-based services usually rely on secure passwords and encryption technologies.” — Chris Moyer

Today’s WhatIs.com Word of the Day is BYOA, the trend toward employee use of third-party applications and cloud services in the workplace. BYOA is part of the larger trend of IT consumerization toward the use of consumer market technologies within the enterprise. Continued…

Related Terms

IT consumerization
BYOD
MAM
IT consumerization policy
application sandboxing

Quiz Yourself

Why would an enterprise software developer want to wrap an app?
a. to associate specific security policies with the app’s use.
b. to protect the app from copyright infringement.
Answer

Related Reading

BYOA is here: Six steps to making mobile apps enterprise-ready
Whether you have a mobility strategy or are working on one, these six steps for making mobile apps enterprise-ready will be helpful.

Prevent BYOA headaches
Managing the growing BYOA trend doesn’t mean banning employees’ personal apps—but it does require clear communication and careful monitoring.

Mobile device trends in the enterprise: It’s a numbers game
Read what attendees and speakers at the CITE forum had to say about mobile device trends such as BYOA.


November 1, 2013  2:50 PM

Word of the Day: Google BigQuery



Posted by: Margaret Rouse
Technology

Overheard

“When asked where Google fits into the pantheon of big cloud players, panel experts at Cloud Connect Santa Clara all agreed it could be a big player — if it wanted to.”Mark Eisenberg

Today’s WhatIs.com Word of the Day is BigQuery, a cloud-based big data analytics service for processing very large read-only data sets. BigQuery was designed as a query tool for analyzing data on the order of billions of rows, using a SQL-like syntax. It runs on the Google Cloud Storage infrastructure and can be accessed with a REST-oriented application program interface (API). Continued…

Related Terms:

cloud service
infrastructure-as-a-service
big data analytics
ad hoc analysis
REST
API
Hadoop cluster

Quiz Yourself

The name Google was chosen for its resemblance to the number googol (a tribute to the vast amount of information in the world). If you were to write down the number googol, how many zeros would you use?
a. one hundred
b. one thousand
c. one million
Answer

Related Reading

Entry-level big data analysis with Google BigQuery
Hadoop can be intimidating, but for enterprises keen on SQL, Google BigQuery may be an easy choice for big data analysis.

Google’s big data infrastructure: Don’t try this at home
Jeromy Carriere spoke about Google’s big data infrastructure at a TDWI Boston chapter meeting. The work is impressive, but should it influence other data warehouse efforts?

Is Google mature enough for the enterprise?
Some experts say yes, but warn that IT will also need to work in a more Google-like way.


October 31, 2013  1:09 PM

Word of the Day: text mining



Posted by: Margaret Rouse
Technology

Overheard

“Analyzing the data that pours out of countless social media sites across the Web has become increasingly critical for forward-thinking organizations looking to stay ahead.”Aaron Lester

Today’s WhatIs.com Word of the Day is text mining,  the analysis of natural language text. The application of text mining techniques to solve business problems is called text analytics. Applying traditional data mining techniques to unstructured data can be challenging because natural language text is often inconsistent, containing ambiguities caused by inconsistent syntax and semantics. Text analytics software can help by transposing words and phrases in unstructured data into numerical values which can then be linked with structured data in a database and analyzed with traditional data mining techniques. Continued…

Related terms:

data mining
natural language
unstructured data
sentiment mining
noisy text
social media analytics

Quiz Yourself

What is the Cupertino effect?
a. the tendency for humans to continue investing in something that clearly isn’t working
b. an erroneous suggestion or replacement by a spellchecker
Answer

Related Reading

Channel partner loyalty: You’re being watched
Partner InSite can evaluate channel partner loyalty by analyzing the language used on a partners’ websites.

Social media analytics software pulls useful info out of online muddle
Social media analytics software enables businesses to sift through the sea of data on social networks and gain insights that can aid decision making on key business issues.

For unwary users, social media data analysis can be an unfriendly task
Learn which obstacles can stand in your way when rolling out a social media analytics program.


October 30, 2013  3:38 PM

Word of the Day: human capital management



Posted by: Margaret Rouse
Technology

Overheard

“Human capital management systems encompass a range of capabilities, including performance management, succession planning, recruiting and orientation.”Sue Hildreth

Today’s WhatIs.com Word of the Day is human capital management, an approach to employee staffing that perceives people as assets (human capital) whose current value can be measured and whose future value can be enhanced through investment. Continued…

Related Terms

talent management software
talent analytics
enterprise resource planning
human resource management system
human resource information system

Quiz Yourself

In HR lingo, what do you call the emotional connection an employee experiences that results in his willingness to expend discretionary effort at work?
Answer

Related Reading

Cold storage company reduces human capital management complexity
Since going live in June, Dayforce Human Captital Management has helped Millard Refrigerated Services reduce paper-based processes and improve employee self-service.

Guide to human capital management software
In this guide, learn the growing importance of HCM software, preview future HCM software trends and find out how HCM software differs from HRMS.

Integrating talent management and core HR systems valuable but tricky
Although real-time integration between talent management and core HR systems is desirable, complexity often trips companies up, experts say.


October 28, 2013  2:32 PM

Word of the Day: sharing economy



Posted by: Margaret Rouse
Technology

Overheard


“There’s this sea change and mind shift happening around the American dream. It used to be about ownership, but now it’s about access and convenience.” – Brian Harrington

 

Today’s WhatIs.com Word of the Day is sharing economy, a trending business concept that highlights the ability (and perhaps the preference) for individuals to rent or borrow goods rather than buy and own them. The most important criteria for a sharing economy is that it allows individuals to monetize assets that are not being fully utilized.
Continued…

Related terms:

m-payment
mobile point of sale (mobile PoS)
Square
peer-to-peer (P2P)
sea change

Quiz Yourself

What does direct mobile billing allow you to do?
a. charge merchandise to your mobile phone account
b. share your data plan with family members
Answer

Related Reading

CEO mindset: To grow where no one has grown before
Gartner probes the CEO mindset and sees ‘economic defiance,’ an appetite for digital growth and lots of work for the ambitious CIO.

Why companies must rethink data sharing
GE CEO Jeff Immelt explains to customers the benefits of sharing machine data in an industrial Internet.

Understanding PCI mobile payment processing security guidelines
Mike Chapple discusses the new PCI Mobile Payment Acceptance Security Guidelines and explains what merchants must do to comply with these standards.


October 18, 2013  12:03 PM

Word of the Day: open API



Posted by: Margaret Rouse
Technology

“Now that software-defined networking has become a reality, innovation at the software layer and above will allow for parallelization and virtualization of the network stack. It will also mean open APIs for third-party development.” — Andreas Antonopoulos

Word of the Day

Today’s WhatIs.com Word of the Day is open API, an application program interface that provides a developer with programmatic access to a proprietary software application. Open APIs are published on the Internet and shared freely. Continued…

Related Terms:

API
API management
DevOps

Quiz Yourself

You probably know that this little penguin is the logo for the Linux operating system, but do you know the penguin’s name?
a. Chilly
b. Opus
c. Tux
d. Wheezy
Answer

Related Reading

Open APIs are nice, but vendors must shoulder data center integration
We tout open APIs for automation and integration in the software-defined data center, but that means big effort by engineers, without requiring vendors to work toward integration.
Old SOA versus new SOA? Open APIs change the game
The high-profile Oracle-Google Android trial shows the changing nature of the Application Programming Interface (API). The move is reflected in new API management products.
Essential guide to API management and application integration
This essential guide covers everything from effective API management to key terms associated with the technology.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: