Word of the Day Archive


September 16, 2016  2:42 PM

HTTPS

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
HTTPS, Security

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued…

Quote of the Day

“Installing a digital certificate and providing users with the ability to make HTTPS connections to your Web server is one of the simplest ways you can add security to your website and build user confidence in conducting transactions with you over the Web.” – Mike Chapple

Learning Center
Google to tweak Chrome browser security in 2017, flag HTTP as insecure
Google plans to level up Chrome browser security by flagging unencrypted HTTP payment or login pages as insecure, starting in 2017.

Google boosts HTTPS, Certificate Transparency to encrypt Web
Google pushes HTTPS, Certificate Transparency log viewer and more support for Web encryption, as other tech firms eye expanding strong encryption.

HSTS: How HTTP Strict Transport Security enhances application security
Application security expert Michael Cobb reveals whether HTTP Strict Transport Security (HSTS) truly offers better application security than HTTPS.

What HTTP/2 means to the data center and its security
HTTP/2 responds to the need for less latency and higher performance when retrieving and exposing richer Web content. See what improvements come in the upgrade.

How can an HTTP referer header help maintain user Web privacy?
Learn the pros and cons of an HTTP referer header and discover why one can be critical to ensuring user Web privacy.

Related Terms
HTTP
digital certificate
Netscape
S-HTTP
certificate authority

Related Tags
Web browser security
Network protocols and security

September 14, 2016  9:08 PM

KVM hypervisor

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hypervisor, KVM, Virtualization

KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM). In KVM, the Linux kernel acts as a Type 2 Hypervisor, streamlining management and improving performance in virtualized environments. Continued…

Quote of the Day

“Kernel-based Virtual Machine (KVM) contains virtualization extensions that boost security and performance, and allows organizations to deploy multiple VMs running unmodified Linux or Windows images.” – Jim O’Reilly

Learning Center
Will Nutanix’s KVM-based hypervisor shake up VMware?
Using a KVM-based hypervisor, Nutanix Acropolis is hitting VMware in the wallet for what many feel are exorbitant licensing fees.

Xen vs. KVM Linux virtualization hypervisors
Which side wins in the Xen vs. KVM Linux virtualization hypervisor debate? Two IT experts weigh-in with their Xen-KVM comparisons.

Quiz: KVM hypervisor and virtual infrastructure management
Take this quiz on the KVM hypervisor to test your knowledge on KVM virtual machine management and the differences between Xen and KVM virtualization.

Support for multiple hypervisors could solidify VMware’s future
As more companies work with Linux, it makes sense for VMware to consider KVM first if it wants to add management support for multiple hypervisors.

How end users can access VMs with virt-manager
End users using virt-manager to access virtual machines on a KVM hypervisor isn’t always convenient, but it’s not impossible.

Related Terms
KVM
hypervisor
kernel
Type 2 hypervisor
BSD

Related Tags
Open source virtualization
Virtualization technology and services


September 13, 2016  8:46 PM

ROT (redundant, outdated, trivial information)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data quality

ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value. Continued…

Quote of the Day

“ROT is created very simply by hoarding information. It’s information that organizations hang onto with the mindset of keeping it ‘just in case.’” – Pamela Doyle

Learning Center
Big data doesn’t mean big intelligence … unless you work at it
For BI, big data can be a vital part of the range of data sources that each business department uses. However, the aim should be to make users smarter in their daily activities.

Too much business information? It’s not a new problem
The business information “explosion” has brought the problem into sharper relief, but there has long been too much data. Sorting through it is the real issue.

Content analytics becomes an enterprise must-have
As companies increasingly use content for an array of operations, they are recognizing that content analytics is central to improved operations.

How much data is too much for cloud gateways?
Enterprises with up to 50 TB of data may find public cloud storage attractive given the local storage limits of the current cloud gateways, says Gartner analyst.

Better data quality process begins with business processes, not tools
Efforts to improve the data quality process should start with an assessment of data problems and procedural changes to help avoid them, then the possible addition of data quality tools.

Related Terms
regulatory compliance
autoclassification
predictive coding
information governance
redundant

Related Tags
Data quality techniques and best practices
Managing governance and compliance


September 12, 2016  8:10 PM

columnar database

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
DBMS

A columnar database is a database management system (DBMS) that stores data in columns instead of rows. Continued…

Quote of the Day

“Columnar database technology lets you go deeper in big data analytics, speeds up enterprise reporting and cuts down on the number of administrators needed for storage.” – Wayne Kernochan

Learning Center
A look inside the SAP IQ column-oriented database
The SAP IQ 16 column-oriented database can be used to deploy decision support, business intelligence, data warehouse and data mart implementation.

Why columnar database technology should matter to IT
A columnar database handles data differently than a relational database and can improve big data and enterprise applications. Here’s how it works and how the vendor offerings differ.

What’s available in columnar databases
Appliances for columnar databases compete with — and sometimes work alongside — relational database offerings in various ways. We take a look at the four main vendors for columnar databases.

GPU database serves up analysis of tweets, other data feeds
A Harvard and MIT researcher found benefits in use of a GPU database over techniques such as Hadoop for analytics on massive numbers of social tweets.

How to justify the purchase of a data integration tool
With big data everywhere, data integration is more vital than ever. Explore how a data integration tool can help address your enterprise’s needs.

Related Terms
database management system
in-memory analytics
compression
RDBMS
RAM

Related Tags
DBMS architecture design and strategy
Data warehouse software


September 9, 2016  6:44 PM

recommendation engine

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data Science, Machine learning, Predictive Analytics

A recommendation engine, also known as a recommender system, is software that analyzes available data to suggest something that an end user might be interested in such as a website, a book, an article of clothing, a video or a job. Continued…

Quote of the Day

“What’s coming down from larger-scale data that we want to induce things from is using machine learning with recommendation engines to say ‘You may not have known it, but based on the patterns we see, here’s what you need to look into.'” – Ritika Gunnar

Learning Center

Data science industry eyes machine learning, recommendation engines
The data science industry isn’t waiting for you. Developers, it’s time to get educated on machine learning and recommendation engines or get left behind.

Semi-structured data is king of LinkedIn’s recommendation engine
LinkedIn’s semi-structured data shines, CVS responds to social media finger wagging, and Microsoft does the shuffle, The Data Mill reports.

Online music startup picks a recommendation engine
Neil Young’s PonoMusic opted for Datameer platform software to field a site recommendation engine. The goal: Give users the feel of a vinyl store of yore

Data scientists benefit when they pay attention to tools for big data
Data scientists may not like spending time on tools for big data, but doing so can pay off in better analyses and more time to do real data science.

Fashion tech startups use data science to build virtual dressing rooms
Fashion tech startups Virtusize, Clothes Horse and LoveThatFit are solving online fashion’s fit problem.

Related Terms

engine
predictive analytics
algorithm
machine learning
predictive modeling

Related Tags

Enterprise data architecture best practices
Enterprise business intelligence software


September 8, 2016  8:14 PM

overlay network

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Networking, SDN, Virtualization

An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure. Continued…

Quote of the Day

“Overlay networks create virtual network containers that are logically isolated from one another even though they share the same underlying physical network.” – Lee Doyle

Learning Center

LAN SDN management looks to the cloud and causes LAN ghost towns
As campus LANs move from on premises to the cloud, they’ll need automated LAN SDN management, which will create new network manager opportunities.

Overlay networks: Understanding the basics, making it a reality
Network overlays place a virtual network over the physical infrastructure for dynamic provisioning and orchestration of network resources.

Is fabric necessary for network virtualization overlay?
A network virtualization overlay can work just fine without a fabric underpinning, according to a network expert.

Network virtualization now, and the overlay network future
In part 1, expert Jim Metzler examines network virtualization (NV), including traditional approaches and emerging developments like overlay networks.

Overlay networks could revolutionize ISP backbone
Overlay networks aren’t just for the data center. ISPs can’t ignore the reduced Opex and increased agility that network overlays could bring to backbone networks.

Related Terms

SDN overlay
peer-to-peer
virtual private network
content delivery network
VXLAN

Related Tags

Network overlay software
SDN network virtualization


September 7, 2016  6:25 PM

leet speak

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hacking, Programming, Security

Leet speak, also known as hackspeak or simply leet, is the substitution of a word’s letters with numbers and/or special characters. Continued…

Quote of the Day

“I take a word and use ‘hacker speak’ to substitute numbers or special characters in place of some letters. That way I can still remember the password, and it won’t be cracked by a simple dictionary attack or easy guess. For instance, instead of using ‘october,’ change it to ‘oct0b3r.'” – Tony Bradley

Required Reading

How effective are password hack tools?
Learn how password hack tools are being used in combination with Nvidia Graphics card and rainbow tables to crack WPA and Wi-Fi credentials. Make sure to create a strong password, even with the Leet alphabet.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

Expert how-tos: Creating strong passwords
In this tip, five Windows-security experts respond to the question, “How do you create strong passwords?”

Business security begins with a strong password policy
A sound password policy alone won’t guarantee your company’s security, but you have little chance without one.

How to build complex passwords and avoid easy breaches
Password problems are leading to easy data breaches like the recent celebrity iCloud hack. Expert Keith Palmgren discusses how to build unpredictable and complex passwords.

Related Terms

strong password
dictionary attack
private key
alphanumerish
Pwn2Own

Related Tags

User passwords and network permissions
Hacker tools and techniques, underground sites and hacking groups


July 30, 2014  1:58 PM

Explaining SMAC (social, mobile, analytics and cloud)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Technology

WhatIs.com Word of the Day

SMAC (social, mobile, analytics and cloud) is the concept that four technologies are currently driving business innovation. SMAC creates an ecosystem that allows a business to improve its operations and get closer to the customer with minimal overhead and maximum reach. None of the four technologies can be an afterthought because it’s the synergy created by social, mobile, analytics and cloud working together that creates a competitive advantage.

Quote of the Day

“Social, mobile, analytics and cloud technologies (SMAC) are the front runners in disruptive technologies driving business innovation…” – Karl Flinders

Related Terms

1:1 marketing
customer analytics
mobile location analytics
Nexus of Forces
loyalty card program
social media analytics
cloud analytics
social login
disruptive technology
data broker

Related Tags

Customer privacy and data security
Commerce technology and strategy

Required Reading

From smoke signals to SMAC, digital business arrives
Harvey Koeppel analyzes how social media, mobile, analytics and cloud technology has transformed business communications. It’s time for CIOs to get their SMAC on.

Talking SMAC with Dell CIO Andi Karaboutis
Dell CIO Andi Karaboutis talks about the demand for SMAC and self-service analytics.

CIO Interview: Lance Fisher, CIO, SThree
Learn why sThree CIO Lance Fisher’s IT strategy revolves around around SMAC.

A guide for CIOs: SMAC strategy and governance
Read this Essential Guide to learn how SMAC technologies are changing the way businesses run. Explore the benefits of a SMAC strategy and find expert tips on SMAC governance best practices.


July 28, 2014  1:57 PM

hardware-as-a-service (HaaS)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Technology

Word of the Day

Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing. In the hardware-as-a-service model, hardware that belongs to a managed service provider (MSP) is installed at a cutomer’s site and a service level agreement (SLA) defines the responsibilities of both parties.

Quote of the Day

“Vendors as well as distributors and independent finance companies are being forced to be more dynamic with their offerings as customers grow fond of paying for IT solutions on a monthly recurring payment model as an operating expense, with little interest in owning anything.” – Lynn Haber

Related Terms

customer premises equipment
managed service provider (MSP)
managed IT service
infrastructure-as-a-service (IaaS)
managed hosting

Related Tags

MSP Business Model

Required Reading

Plantronics’ new hardware as a service UC devices complement UCaaS
Plantronics is offering a hardware as a service program which will bundle the costs of UC devices with UCaaS offerings.

Server refresh options: When to rent a server vs. when to buy
Companies should look at financing options when deciding whether to rent a server or buy a server.

Should you lease or buy network equipment?
You might not think twice about leasing a car or renting an apartment, but what about your switches and routers?


July 25, 2014  3:18 PM

Word of the Day: cloud storage gateway

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Technology

Word of the Day

A cloud storage gateway is a stand-alone computing device or a virtual machine (VM) located on the customer premises that serves as a bridge between local applications and remote cloud-based storage.  As the market has evolved, some vendors have dropped the word “gateway” in favor of the word “controller” to emphasize the idea that their gateway products do more than just translate protocols and serve as a bridge.

Quote of the Day

“Call them cloud controllers, cloud storage enablement or maybe cloud-integrated storage. Just don’t call them cloud storage gateways, at least not when you’re talking to any of the vendors who sell these intelligent cloud storage systems.” – Ellen O’Brien

Related Terms

cloud storage
tiered storage
cloud provider API
public cloud storage
private cloud storage
open source cloud storage
cloud storage SLA
Hybrid cloud storage

Required Reading

Panzura says cloud gateway appliance has no value, so now it’s free
Panzura says a cloud gateway appliance has no value, so its giving it away for free and Google Cloud Storage will throw in 2 TB of free capacity to get customers started.

Cloud storage controller market: One-stop guide
This guide provides perspective on where the cloud storage appliance market has been and where it’s going.

Cloud storage architecture vs. local storage
It can be a challenge to use local storage and cloud storage architecture seamlessly. Learn the key differences and how to bridge the gap with cloud storage gateways.

Master the complexities of using cloud storage
The articles in this drill-down offer insight into the latest cloud technology and tell you the key questions you need to ask your service provider and your storage team.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: