Word of the Day: Tech Definitions from WhatIs.com


January 16, 2017  9:44 PM

predictive analytics

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Deep learning, Predictive Analytics, predictive modeling

Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends. Continued…

Quote of the Day

“The 2016 U.S. presidential election shined a light on the imperfections of predictive models, and their failure to predict its outcome will have an impact on enterprises in 2017.” – Dan Magestro

Learning Center
International Institute for Analytics’ five analytics predictions
The International Institute for Analytics offers up five analytics predictions for 2017.

Predictive analytics in healthcare helps manage high-risk patients
Advanced Plan for Health uses predictive analytics in healthcare to help keep populations healthy as well as help organizations reduce costs.

The trouble with predictive analytics tools
Predictive analytics tools are hailed as the way to increase sales and reduce operational costs. But first, you need to understand what the data indicates.

Don’t let a data-driven approach ax judgment from analytics equation
A data-driven approach to analytics isn’t foolproof. Data scientists and business users have a role to play in assessing the results of analytical models.

Events of 2016 put strain on predictive analytics algorithms
As the world becomes a less predictable place, businesses need to rethink how they implement predictive analytics algorithms in their operations.

Trending Terms
deep learning
prescriptive analytics
predictive personalization
descriptive analytics
predictive modeling
decision tree

Writing for Business
Neither of the content analytics applications _____ backwards compatible.
A. is
B. are
Answer

January 12, 2017  9:23 PM

snackable content

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Content Management, Enterprise content management

Snackable content is website content that is designed to be easy for readers to consume and to share.  Continue…

Quote of the Day

“Snackable content is bite-sized, immediately accessible and tuned to your current contexts.” – Geoffrey Bock

Learning Center
Five snackable content ingredients that add flavor to UX
Mobile users need bite-sized content that’s immediately accessible and contextually relevant. Find out how to develop this snackable content.

Content is still king in social media strategy
For media companies like ESPN and Turner Sports, social media strategy is all about placing content front and center, not sending out vapid tweets.

Enterprise content management trends
Technology trends like mobility could disrupt the ECM software market. Check out the 2014 enterprise content management trends that are poised to be game changers.

How can mobile strategy create better digital experiences?
Mobile Web experiences are shifting from a publishing environment to delivery of interactive digital experiences, making information architecture key to mobile strategy.

Is the Drupal content management system right for your business?
The Drupal content management system is open source software that provides users of all skill levels with tools for content development and organization.

Trending Terms
native advertising
gated content/ungated content
intelligent content
dot com disclosures
content generation software
structured content

Writing for Business
Snackable content, _____ Twitter posts, infographics and video clips, can be consumed quickly.
A. i.e.
B. e.g.
Answer


January 11, 2017  8:06 PM

exploit kit

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
malware, Threat actor

An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continued…

Quote of the Day

“Exploit kits make the job of an attacker much easier but can be defended against easily by understanding the vulnerabilities and software they most often target.” – Michael Heller

Learning Center
Five tips for preventing a hospital ransomware attack
Cyberattacks against healthcare organizations are projected to increase in 2017, but these five tips can help IT prevent a hospital ransomware attack.

Exploit kit delivered via malvertising targets unpatched systems
The Stegano exploit kit is now being delivered in a malvertising campaign and has been targeting unpatched systems.

Crypto ransomware lurks in ads on popular websites
Security researchers warn that the major ransomware malvertising campaign that hit popular websites at the weekend may not be over yet.

Exploit kits evolved: How to defend against the latest attack toolkits
How are the biggest automated exploit kits evolving and what can enterprises do to defend against the latest methods employed by these attack toolkits? Expert Nick Lewis discusses.

How to track and prevent crimeware attacks
Preventing crimeware is imperative, especially as attacks are financially motivated. Enterprises need to look at the incidents and launch a formal investigation to prevent crimeware attacks.

Related Terms
threat actor
malware
drive-by download
malvertisement
attack vector

Related Tags
Malware, viruses, trojans and spyware
Hacker tools and techniques, underground sites and hacking groups


January 10, 2017  10:32 PM

mechatronics

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Artificial intelligence, Deep learning, Machine learning

Mechatronics is a branch of engineering that focuses on designing, manufacturing and maintaining products that have both mechanical and electronic components. Continued…

Quote of the Day

“In the past we referenced this collection of [engineering] disciplines as systems engineering, but the term mechatronics is capturing more traction now.” – Jim Devaprasad

Learning Center
3D technologies promise new age of smart, ‘augmented’ product design
Read why some experts say the 3D technologies of 3D scanning, imaging, modeling and printing will transform how products are designed and manufactured

Artificial intelligence implementation: Getting past barriers
Learn about the obstacles to artificial intelligence implementation and how to convince the C-suite to invest in the technology.

Tom Davenport: Getting started on enterprise AI
Enterprise AI is coming to an IT department near you. In this Q&A, Tom Davenport talks about how CIOs can prepare.

Embedded systems and SOA: Strange bedfellows get closer as systems of systems
As the world becomes more computerized, embedded systems and enterprise systems are becoming intermixed.

Manage vendor access for industrial control systems security
Does your company have explicit rules and expectations for vendors to follow when they connect to your industrial control system?

Related Terms
mechanical engineering software
machine learning
machine vision
embedded system
systems thinking

Related Tags
IoT APIs, applications and software
Enterprise artificial intelligence


January 9, 2017  9:21 PM

unit testing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Automated Testing, Continuous delivery, Unit testing

Unit testing is a software development process in which the smallest testable parts of an application, called units, are individually and independently scrutinized for proper operation. Unit testing can be done manually but is often automated. Continued…

Quote of the Day

“The number of combinations one has to test for even the most trivial of programs can be staggering. A pair of nested for loops, for example, can have unique test cases that number in the millions.” – Matt Heusser

Learning Center
Exploring the three major categories of application testing tools
Automation, code coverage, support and bug tracking are the four major categories of application testing tools. Learn about each and how they can help your organization.

DevOps quiz: What IT admins need to know
Considering more DevOps training? Take this DevOps quiz to test how knowledgeable you are about the essential tools and concepts.

What application testing tools does your enterprise need?
Automation, bug tracking and coverage are types of application testing tools that can aid an enterprise in testing efficiencies. These use cases also help determine that need.

A complete beginner’s guide to DevOps best practices
New to DevOps? Expert Matthew Heusser offers an inside look at proven DevOps best practices including what not to do when getting started.

How do we make testing in DevOps happen correctly?
Testing in DevOps has to work, but it’s tricky and not enough attention is being paid to it. Expert Gerie Owen highlights the challenges.

Related Terms
test-driven development
integration testing
Extreme Programming
continuous delivery
automated software testing
walking skeleton

Related Tags
Software testing and QA fundamentals
Software deployment management


January 6, 2017  11:16 PM

two-factor authentication (2FA)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
2FA, Authentication

Two-factor authentication (2FA) is a security process in which the user provides two authentication factors to verify they are who they say they are. 2FA can be contrasted with single-factor authentication (SFA), a security process in which the user provides only one factor — typically a password. Continued…

Quote of the Day

“Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics.” – Craig Mathias

Learning Center
How can two-factor authentication systems be used effectively?
SMS is no longer considered secure for use in two-factor authentication systems. Find out what true two-factor authentication is and how to implement it.

What’s the difference between two-step verification and 2FA?
Two-step verification and two-factor authentication are often confused with one another. Find out if there are any real differences between the two.

Why mobile two-factor authentication is better than biometrics
By adding a second criterion to device access, mobile two-factor authentication makes it much more difficult for hackers to access users’ devices.

Take control of virtual desktop access with two-factor authentication
To grant users virtual desktop access, VDI shops need more than passwords. Two-factor authentication can prevent unwanted access to virtual desktops.

Related Terms
authentication factor
multifactor token
single-factor authentication
multifactor authentication
knowledge factor

Related Tags
Two-factor and multifactor authentication strategies
Web authentication and access control


January 5, 2017  6:26 PM

Puppet (Puppet Labs)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Configuration management, Puppet, Puppet Labs

Puppet is an open source systems management tool for centralizing and automating configuration management. Configuration management is the detailed recording and updating of information that describes an enterprise’s hardware and software. Continued…

Quote of the Day

“As Puppet is seen as a relatively easy tool to learn, it can be used by and benefit organizations of all sizes.” – Clive Longbottom

Learning Center
Look inside an advanced Puppet tutorial
This Puppet tutorial, ‘Extending Puppet’, helps sys admins use the configuration management tool to manage and customize IT infrastructures.

Puppet configuration management tool enables DevOps culture
The Puppet configuration management tool is giving development and production IT at one company ways to work together and move faster.

Why you need and how to use IT configuration management
IT configuration management is critical for organizations today. With rapid change being the new norm, learn how this process can benefit your organization.

Select the best configuration management tools for your company
Configuration management tools are essential for monitoring a modern IT infrastructure. Learn what CM offerings will suit your company best.

Puppet automation shows value in enterprise container management
Puppet automation isn’t just relevant in an enterprise container management environment, it’s essential, argue industry experts.

Related Terms
configuration management
Ruby
DSL
policy-based management
IAC

Related Tags
Configuration management and DevOps
Real-time performance monitoring and management


January 4, 2017  8:44 PM

channel partner

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Channel partners, OEM, VARs

A channel partner is a person or organization that provides services or sells products on behalf of a software or hardware vendor. Continued…

Quote of the Day

“Looking ahead, partners should focus on four generic technology areas that go ‘hand in hand’ — cloud computing, mobility, security and collaboration.” – Anurag Agrawal

Learning Center
The Trump economy: IT channel weighs business opportunities for 2017
The 2017 Trump economy: IT channel experts consider the impact of changes to taxes, regulations, offshore outsourcing, Brexit and more.

Quiz: The latest on IT channel partner programs
IT channel partner programs, cloud computing trends and emerging technology take center stage in this month’s news quiz.

Channel business model: Transition time for IT partners
Channel business model makeover: Partner firms may need to shake up their approach to the market in order to remain viable over the long haul.

Cloud distributor model makes channel partner inroads
Cloud distributor firms are finding business among channel partner companies that need help breaking into the cloud services market.

IT RFP: How to influence the bid as a channel partner
IT RFP doesn’t have to spell disaster. Channel partners can work to influence bids early on to improve their chances of winning the deal.

Related Terms
VAR
management service provider
lead generation
OEM
request for proposal

Related Tags
Technology vendors/OEMs
Channel business management strategies


January 3, 2017  9:12 PM

key performance indicator (KPI)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
key performance indicators, Metrics

A key performance indicator (KPI) is a business metric for evaluating factors that are crucial to the success of an organization. The purpose of using KPIs is to focus attention on the tasks and processes that management has determined are most important for making progress towards declared goals and targets. Continued…

Quote of the Day

“IT KPIs typically fall into three categories: service delivery effectiveness, service or performance efficiency and agility (responding to change).” – Stephen J. Bigelow

Learning Center
My manager wants quality as a KPI measurement — help!
When the boss wants quality as a KPI measurement, you don’t have many options. Expert Matt Heusser walks you through the process.

Why are cybersecurity KPIs important for enterprises to determine?
Cybersecurity KPIs are a measurable way to reach security goals in an enterprise. Here’s how a KPI for security can benefit an infosec program.

Checklist of IT KPIs for responsive data center ops
KPI metrics gauge if a business is meeting, exceeding or falling below certain defined goals. These IT KPIs deal with service level, responsiveness and efficiency in the data center.

Finding KPIs that matter to the business
Identifying KPIs that matter to the business is as much art as science. A panel of CFOs at the recent MIT Sloan CFO Summit explain.

Growth best practices and key performance indicators for IT solution providers
The Taylor Business Group’s Larry Schulze outlines key performance indicators for IT solution providers, including optimal cost and profitability percentages.

Related Terms
metric
business intelligence
LOB
performance scorecard
service-level management

Related Tags
CRM analytics and business intelligence
Business intelligence dashboards and performance scorecards


December 21, 2016  10:11 PM

geofencing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
drone, Geofencing, geolocation

This definition is one of Top 10 Terms to watch in 2017!

Geo-fencing (geofencing) is a feature in a software program that uses the global positioning system (GPS) or radio frequency identification (RFID) to define geographical boundaries. Continued…

Quote of the Day

“Apps on location-aware devices can make use of geofences to trigger different types of actions as the user enters or exits a geofenced location.” – Michael Cobb

Learning Center
Location of things: Why location matters in IoT
An emerging IoT subcategory known as the ‘location of things’ is becoming an organizing principle for anything connecting to the Internet.

With safety and surveillance under its belt, video tackles insight
Your organization’s most underutilized sensor is moving to the frontline in an IoT-enabled world. Get ready for video, the next big insight creator.

Asset tracking: What products and services can trace device location?
Asset-tracking products and services can give you the precise location data of devices in and out of workplaces. Find out what options are available.

Drones – taking off or staying grounded?
While excitement grows in anticipation of potential mass adoption of drones, the industry has to overcome hurdles in the form of regulation.

How can geofencing improve an enterprise security strategy?
Expert Michael Cobb explains the pros and cons of geofencing and discusses whether one should be an integral part of an enterprise security strategy.

Related Terms
location-based service
drone
location intelligence
geolocation
geotargeting

Related Tags
Network design
IoT wireless


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: