|“…Building an enterprise cloud based on a reference architecture without considerable work defining business objectives and system requirements would only be an exercise in frustration. ” — Beth Cohen|
Today’s WhatIs.com Word of the Day is reference architecture. In project management, it’s a resource comprised of documentation from past projects. The idea is that you can “go shopping” for ideas of how something was built in the past and either copy it, avoid it or adopt it.
Vendors are using the term today to sell their converged infrastructure products, providing potential customers with a “reference architecture” for possible ways to buy/use their products. In a worst-case scenario, you can simply substitute the words “hypothetical implementation” for the much more real “reference architecture.”
|“Predictive coding is a relatively new approach to electronic discovery and many have been reluctant to utilize the process. The reluctance is due, in part, to the lack of judicial guidance regarding whether predictive coding is an acceptable practice in the electronic discovery arena.” — Janet Ayyad|
Today’s WhatIs.com Word of the Day is predictive coding. It’s an iterative approach to e-discovery that’s also known as computer-assisted discovery, technology-assisted discovery or less accurately, automated discovery. Coding is to digitally categorize a document as being responsive or unresponsive to a discovery request.
Predictive coding is not exactly new, but it’s causing a big buzz right now because a recent court ruling allowed it and one side tried to require the other side to use predictive coding in another case. And you know what happens when a buzzword gets hot, right? Vendors add to the confusion by slapping the term on every new product, product enhancement and ad campaign they’ve got coming down the pike.
Here’s what you need to know about predictive coding. It won’t replace a room full of lawyers combing through boxes of documents. It’ll just allow them to take less time and it’ll be most useful when there are hundreds of thousands of documents to go through. You see, the lawyers still have to work with IT to create the “seed set.” That’s the set of documents that the computer program uses to learn from. Once the seed set has been created, there’s a lot of back and forth as the lawyers and their IT team fine tune the accuracy of what the computer program is returning in its queries. A LOT of back and forth. Once the program has established a level of statistical reliability that the lawyers feel they can defend in a court of law, however, the program can be used make predictions for the remaining documents. It’s still a lot of work.
|“Canary-ing is what you do after you’re done testing. It’s how you roll changes out. After you have decided that this has been tested, you now roll it out to a small percentage and watch very carefully.” — Thomas Bushnell|
Today’s WhatIs.com Word of the Day is canary. It’s a very quiet push of code to a small select group of end users who have not opted in to test code.
|“Just imagine if all sidewalks, paths, corridors and floor spaces were constructed of piezoelectric tiles. This trending technology could be the key to helping CIOs run an energy-efficient and sustainable business. For example, the energy created from swivel chairs constantly rolling across piezoelectric tiles could operate low-power applications in offices. On a grand scale, a CIO could run an entire energy-savings system from the foot traffic of company employees.” — Wendy Schuchart|
|“Pinning photos of switches and other IT equipment might not be the answer, but channel partners can pin graphics of network architecture, complex code or detailed product diagrams.” — Rachel Shuster|
Today’s WhatIs.com Word of the Day is Pinterest, a social curation website for sharing and categorizing images found online. If you are the kind of person who rips things out of magazines, you’re going to love this site. Better get there quick — before marketers discover how to use the site to reach potential customers and change it from a grass roots site into a slick marketing machine.
|“Whether someone comes in to work at 11 and leaves at 7, it doesn’t matter. What they’re doing is bringing results. That’s what matters.” — Katie Bardaro|
Today’s Word of the Day is ROWE (results only workplace environment). You do you work and it doesn’t matter when — as long as you don’t cause a bottleneck for your co-workers. Happy Labor Day everyone!
|“Advocate Health Care tackled prevention of central-line infections by setting up an electronic intensive care unit in which nurses remotely monitored camera feeds from three of its hospital ICUs during central-line insertion…When monitors gathered their data and fed findings to the ICUs on how to improve protocol adherence, central-line infections dropped.” — Don Fluckinger|
|“In-memory database caching technology holds information within random access memory (RAM) where it is more easily accessed by applications. The technology leads to increased speed and greater scalability because applications spend less time reading data stored on disks.” — Mark Brunelli|
Today’s WhatIs.com Word of the Day is in-memory database, a database whose data is stored in main memory to facilitate faster query response times.
|“Your call list should have designated backups for each key individual and multiple contact information for them as well. If you are using a call tree, make sure that you have a loop back so that the last person on the list will confirm that the call was made.” — Harvey Betan|
Today’s WhatIs.com Word of the day is call tree. A call tree — sometimes referred to a phone tree, call list, phone chain or text chain — is a telecommunications chain for sharing news. In the enterprise, a call tree can be carried out with software that automatically attempts to reach individuals on the contact list. If the call tree is done manually, the last person on the list should contact the first person on the list to complete the chain.
|“It is inevitable people will use these apps for personal and business use. The challenge for enterprise IT departments is balancing the productivity gains of BYOA with the security and business continuity risks,” — Rodney Gedda|