Word of the Day: Tech Definitions from WhatIs.com

August 31, 2017  7:38 PM

DSC pull server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
DSC, Powershell

A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. Continued…

Quote of the Day

“The DSC push/pull model adds flexibility to environments that require a particular mode to maintain proper configurations.” – Tim Warner

Learning Center
Windows Server 2016 changes prompt a new look at management
Some server admins prefer traditional GUI management, but certain Windows Server 2016 changes steer users toward automation — and the cloud.

Windows PowerShell DSC book trains IT to lock down systems
This Windows PowerShell DSC book explains the fundamentals of the configuration management platform and shows admins how to set it up for their organization.

These Windows configuration management tools can prevent mishaps
Windows configuration management tools can ensure that organizations remain compliant — even if undocumented changes are made to systems.

Getting acquainted with PowerShell Desired State Configuration
PowerShell Desired State Configuration has a few advantages over other systems management tools. Here are some of its benefits.

Learn the basics of PowerShell Desired State Configuration
PowerShell Desired State Configuration is a configuration management feature in Windows PowerShell. Learn the fundamentals and where it can help.

Trending Terms
Microsoft Windows PowerShell DSC
configuration drift
Windows Server 2012
Microsoft Windows Management Framework
Microsoft Windows Server 2016

Quiz Yourself
_________ management allows a system administrator to monitor and manage servers by remote control.
a. LUN
b. lights-out

August 30, 2017  9:03 PM

Capex (capital expenditure)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Capex, Opex, ROI

A capital expenditure (Capex) is money invested by a company to acquire or upgrade fixed, physical, non-consumable assets, such as a building, a computer or a new business. Continued…

Quote of the Day

“In the simplest sense, capital expenditures are single payments in exchange for goods or services, while operational expenditures are ongoing expenses paid to maintain a service.” – Meredith Courtemanche

Learning Center
Capital budgeting software helps manage complex investments
Read how capital budgeting software can help you plan and maintain assets, invest in new assets and get Capex under control.

Define CapEx and OpEx as making sense of dollars
Reframe the OpEx versus CapEx debate to understand how CapEx and OpEx best work together. Not every IT service is best served in data centers, and not everything is easier in cloud.

Determine IT operating costs to show the value of cloud migration
A cloud migration plan requires that admins calculate IT operating costs. Opex isn’t as stable a figure as Capex, but it’s more comprehensive for the cloud.

A CTO’s IT spending strategy for a fast-growing platform startup
Brian Morgan, CTO at fast-growing platform startup, Catalant, says his IT spending strategy is built on AWS, open source software — and business goals.

ROI template helps calculate UCaaS costs, benefits
Total cost of ownership is just one component of a UCaaS ROI template. Companies should also calculate the positive impact to business processes.

Trending Terms
enterprise asset management
cost management
capacity planning
business impact analysis

Quiz Yourself
In the general ledger, accounts _______ shows money owed to a business by customers who have made purchases on credit.
a. payable
b. receivable

August 29, 2017  4:17 PM

Melbourne shuffle algorithm

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud storage, Storage array

The Melbourne shuffle algorithm is a sequence of actions intended to obscure the patterns by which cloud-based data is accessed. Continued…

Quote of the Day

“The Melbourne Shuffle is an algorithm that its authors believe will improve existing oblivious storage options as it’s computationally more efficient than previous models.” – Michael Cobb

Learning Center
To manage cloud-based healthcare applications, focus on security
Cloud-based healthcare applications are popular among hospital end users, but IT should prioritize security and set policies to protect health information.

How does the Melbourne Shuffle prevent data access pattern recognition?
Expert Michael Cobb explains how the Melbourne Shuffle can help prevent hackers from being able to complete data access pattern recognition.

Challenges with data protection in the cloud
Learn about data protection in the cloud. There are many challenges with data protection in the cloud since capabilities such as encryption and DLP can be complicated.

Architectural firm explains move to cloud-based data storage
Cloud-based data storage speeds file performance and eliminates the problems when multiple versions of files are used simultaneously by workers.

Skills and temperament drive success in cloud-based data science
Despite the need for more talent in cloud-based data science, not everyone has the right combination of tech skills and temperament to succeed as a data scientist.

Trending Terms
storage array
cloud storage
cloud storage providers
digital footprint

Quiz Yourself
In this service model, a large company might rent space in their storage infrastructure to a smaller company or individual.
a. utility storage
b. virtual storage

August 28, 2017  3:44 PM

blue/green deployment

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Rolling deployment

A blue/green deployment is a change management strategy for releasing software code. Continued…

Quote of the Day

“Application rollout planning requires IT operations teams to strike a precarious balance between development’s demands, user expectations and the realities of everyday business.” – Stephen J. Bigelow

Learning Center
A deployment pipeline keeps infrastructure ducks in their rows
A scripted deployment pipeline allows infrastructure developers to do more work, in less time and with less effort, to greater success.

Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.

When a new software deployment strategy means continuous adjustment
DevOps means that software constantly updates. To support this software deployment strategy, IT departments need to change and evolve.

ALM best practices for advanced DevOps organizations
This guide on ALM best practices compiles the important considerations for organizations transitioning from Agile to DevOps.

How important is ALM process automation in a modern DevOps approach?
ALM process automation is a crucial part of a modern DevOps approach. Discover techniques and tools for implementing automation in your development phases.

Trending Terms
rolling deployment
A/B testing
phased rollout
uptime and downtime
relational database
software testing
canary test

Quiz Yourself
_________ deployment shortens the time between test and release by automatically pushing out code that has passed automated testing.
a. Rolling
b. Continuous

August 25, 2017  5:24 PM

cloud orchestrator

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud Computing, Cloud management, Cloud orchestration

A cloud orchestrator is programming that manages the interconnections and interactions among cloud-based and on-premises business units. Continued…

Quote of the Day

“Cloud orchestration directly relates to cloud automation, as it arranges, sequences and coordinates automated tasks.” – David Linthicum

Learning Center
Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.

Advance multicloud management with orchestration, cost optimization tools
To reduce the complexity around multicloud management, admins need to hone their skills around orchestration, automation and cloud cost management.

Cloud orchestration tools become a must-have for hybrid IT
When choosing cloud orchestration tools, consider that some are built to span multiple cloud environments, while others are dedicated to a single platform.

Why orchestration services are important in the DevOps age
Modern organizations are under pressure to produce big results with short deadlines. Orchestration services can help IT to stay on track and thrive.

Learn the benefits of a container orchestration engine in hybrid cloud
A container orchestration engine, such as Kubernetes, allows for more app portability between public and private clouds, but challenges remain.

Trending Terms
cloud computing
hybrid cloud
cloud provisioning
web service orchestration
cloud management

Quiz Yourself
A ________ cloud has a single tenant architecture.
a. public
b. private

August 24, 2017  6:34 PM

Inbox Zero

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Email management, inbox

Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty — or almost empty — at all times. Continued…

Quote of the Day

“IT professionals seem to have changed their tune, especially as more and more emails flood inboxes and end users try to achieve the holy grail of Inbox Zero.” – Diana Hwang

Learning Center
The Top 5 Disadvantages of Not Implementing an Exception Inbox Zero Policy
How and why should you apply an inbox zero policy when it comes to your exceptions.

Microsoft’s email Clutter tool helps to attain Inbox Zero
IT pros look at Office 365’s email Clutter with a less skeptical eye, noting its ability to personalize end users’ inboxes with only relevant messages based on user behavior.

Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this?

New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?

Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.

Trending Terms
email management
email bankruptcy
time management
email response management service
disappearing email

Quiz Yourself
This is a way for organizations to dictate how email messaging is used in a corporate setting. It also addresses how to secure information that is exchanged via the email system.
A. email governance
B. email management

August 23, 2017  6:25 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
H-1B visas

H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge. Continued…

Quote of the Day

“The H-1B program is a good way of bringing talent into the United States. It gives an opportunity to those from other countries to come to the United States and contribute to the growth of our economy.” – John Moore

Learning Center
Employers pull back on hiring of tech talent for H-1B jobs
Hiring for H-1B jobs in tech is slowed by uncertainty over the visa program for skilled foreign workers, with the administration trying to tighten the program.

Trump’s order on H-1B program puts tech employers on notice
The long-awaited executive order on the H-1B program was issued this week. Take heed, experts said.

Automation vs. the H-1B visa program: Which matters to employees?
The H-1B visa program may face sweeping changes, or even elimination. But industry changes already underway, like automation, may lessen the impact.

Healthcare software developer jobs may be hit by Trump H-1B visa move
EHR vendors could be forced to pay more for healthcare software developer jobs in a Trump plan to reform the H-1B visa program for skilled guest workers.

Citrix CEO talks H-1B visas, other Trump proposals
Citrix CEO Kirill Tatarinov explains why technology companies are on the edge of their seats when it comes to potential changes to immigration and healthcare law.

Trending Terms
SKIL bill
labor arbitrage
human capital management
talent management software

Quiz Yourself
This is an integrated set of software applications that human resource management (HR) professionals use to hire and retain employees.
A. talent management software
B. performance management software

August 22, 2017  8:04 PM

industrial control system (ICS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Operational technology, SCADA, Targeted Attacks

Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued…

Quote of the Day

“Today, it is commonplace to find engineering workstations and servers on the ICS networks using Windows operating systems. These systems are susceptible to WannaCry and other attacks on the Wintel operating systems.” – Ernie Hayden

Learning Center
How does CrashOverride malware threaten industrial control systems?
CrashOverride malware shut down parts of Ukraine’s power grid, and it could threaten other industrial control systems. Here’s what to do about it.

Industroyer malware a turning point for ICS security
Security researchers at Black Hat 2017 tackle the Industroyer malware and the threats to energy grids and ICS security.

How WannaCry malware affects enterprises’ ICS networks
WannaCry malware can be a problem for enterprises’ ICS networks. Here’s a look at why, and what can be done to protect ICS from the ransomware.

A look at the development of an ICS security framework
The ICS security framework development was influenced by other cybersecurity frameworks. Expert Ernie Hayden gives an inside look to the industrial control systems process.

Industrial control systems a growing target for cyber attack
Attackers with increasing capabilities have strong financial motivation to go after critical infrastructure and manufacturing firms, says security industry expert.

Trending Terms
ICS security
operational technology
programmed logic controller
IT/OT convergence
targeted attack
air gapping

Quiz Yourself
This category of hardware and software monitors and controls how physical devices perform.
a. operational technology (OT)
b. information technology (IT)

August 21, 2017  7:49 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Eclipse, Java, Open source

Eclipse is a free, Java-based development platform known for its plug-ins that allow developers to develop and test code written in other programming languages. Eclipse is released under terms of the Eclipse Public License. Continued…

Quote of the Day

“Open source is becoming more accessible because enterprises have seen a number of their peers use it and the sky didn’t fall in.” – Van Lindberg

Learning Center
Oracle opens Java EE, any takers?
The IT industry is discussing where EE might find its next home and bets are split between the Linux Foundation, the Apache Foundation or the Eclipse Foundation.

How to choose cross-platform app development tools
Cross-platform app development tools provide the ability to create apps that can be delivered quickly to many platforms. Learn how this approach can benefit your company.

Open source philosophy goes well beyond software — and into our lives
The open source philosophy is spreading beyond the world of software. Open source advocates at the 2017 Red Hat Summit explained how.

The future of Java promises a cleaner, more readable syntax
Is Java too verbose? Many tend to think so, which is why Oracle’s Java architects are helping to make the syntax of Java more concise in the future.

Open source no longer scares the enterprise
Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door.

Trending Terms
open source
integrated development environment
Visual Studio Express
Java EE

Quiz Yourself
This fundamental component of a computer program can be read and easily understood by a human being.
a. source code
b. object code

August 18, 2017  6:24 PM

Microsoft Windows Defender

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Antimalware, Windows Defender

Windows Defender is Microsoft’s antimalware software. Defender works with Windows Update to automatically install new virus definition files as they are published and provide computers using the Microsoft operating system (OS) with both real-time and anytime scanning options. Continued…

Quote of the Day

“Regardless of whether you use Windows Defender or something else, having antimalware tools in place isn’t enough. You must make sure your defenses actually work.” – Brien Posey

Learning Center
Microsoft antivirus policy changes under Kaspersky pressure
Microsoft antivirus policy changes for Windows 10 Fall Creators Update to get Kaspersky to drop an European antitrust case.

Windows Defender bug could allow full-system takeover
Google’s Project Zero found another dangerous, remotely exploitable Windows Defender bug that Microsoft rushed to patch. Here’s what you need to know about it.

How to create an ideal Windows 10 security setup
To create an effective Windows 10 security setup, IT admins have to look at encryption, password complexity, data loss prevention and more.

Apparent Win10 Defender Update Issues Illusory
Recent cumulative updates have led to reports of Windows Defender update errors. Fortunately, these apparent Win10 Defender Update issues are illusory.

Protect against malware Microsoft Windows Defender
Microsoft Windows Defender, installed by default in Windows Server 2016, protects against known malware, a step towards automatic Windows Server hardening.

Trending Terms
anti-spyware software
Microsoft Security Essentials
Trojan horse
Microsoft Windows Server Antimalware

Quiz Yourself
This is a malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks.
a. ransomware
b. Trojan horse

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: