|“The adjustment [to data visualization tools] been a difficult one, both operationally and culturally. Business users trust their spreadsheets and don’t want to give them up.” — Ron Van Zanten|
Today’s WhatIs.com Word of the Day is data visualization, a general term for technology that provides a graphical representation of data. Data visualzation tools have executive dashboards that translate raw data numbers into colorful pie charts and bar graphs for faster, easier consumption of data.
|“Text analytics — also known as text mining or text data mining — helps organizations identify and understand what people think about them, their products and their services. The software, which combines advanced search techniques with speech-pattern-recognition capabilities, allows users to quickly scour mountains of unstructured or free-form text in the hope of identifying trends in customer sentiment that will ideally lead to positive change.”
Mark Brunelli, Text analytics tools require serious devotion to customers
|“Predictive modeling allows for more informed marketing decisions and more effective resource allocation. Instead of blasting the same offers to everyone, you can target multiple offers by segment or focus on particular customer groups based on current or potential value.”
Colleen Ryan, Predictive Modeling: Turning Data Into Insight
Today’s WhatIs.com Word of the Day is predictive modeling. It’ s used a lot in customer relationship management (CRM) and enterprise resource planning (ERP).
Colleen Ryan does an excellent job explaining how predictive modeling works. While it might seem like voodoo, it’s really mathematical. Remember learning about probability and outcome back in sixth grade? Well, in the real world, its not just about rolling a pair of dice.
Or maybe it is.
Maybe trying to predict outcomes of any kind is still just…gambling.
|“For many years, open source was seen as a trailing effort to proprietary projects. In the big data/NoSQL space, this has been turned on its head. Cassandra is a really good example of how openness is leading the development of next-generation infrastructure technology.” — Joe Brockmeier|
Today’s WhatIs.com Word of the Day is Cassandra, a highly-scalable NoSQL open source database system that was created for Facebook but has since become a top-level project over at the Apache Software Foundation. Cassandra’s claim to fame? She can handle hundreds of thousands of requests per second. According to Apache, the largest Cassandra production cluster as of this writing exceeds 300 terabytes of data over 400 machines.
|“Coaxial cables use a single copper conductor at the center, insulated by a plastic layer and a braided metal shield, which blocks interference. Coaxial cables are hard to install, but can support greater cable lengths than twisted pair.” — Carrie Higbie|
Today’s WhatIs.com Word of the Day is conductor. Conductivity, in general, is the capacity to transmit something, such as electricity or heat.
An electrical conductor is a substance in which electrical charge carriers, usually electrons, move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.
|“Built on mostly open source software and commodity hardware, Digg dropped its open source MySQL database in favor of Cassandra, a non-relational, “NoSQL” database that was developed by Facebook and handed over to the Apache Software Foundation.” — Rob Barry|
Today’s WhatIs.com Word of the Day is Digg, a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.
|“Too many companies rely on the computer-based security training courses that each employee must complete once a year to meet compliance requirements.” — Bob Rudis|
Today’s Whatis.com Word of the Day is security awareness training, a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
With all the pressures a busy security manager has to deal with, documenting end user security awareness is often low on the list. That’s why computer-based training (CBT) is so popular.
Unfortunately, CBT can be boring. It’s SO boring, in fact, that in education it’s often referred to as “drill and kill.”
At last, it seems as if security end user awareness trainers are taking a look at how elementary school educators keep drills interesting — they turn them into games and personalize them.
For instance, if you were an elementary teacher and had to get your students through a daunting amount of word problems to prepare students for standardized testing, you might substitute the names the textbook uses in the word problems for that of your own students and insert students photos or drawing next to the problem.
Or you might turn a drill into a game of Pictionary or Jeopardy or Wheel of Fortune. The bottom line is that anything you can do to make learning fun is as important for adult learners as it is for young ones.
|“Recruiters aren’t yet specifically looking for candidates who are certified in BPM. In fact, of 67 BPM job descriptions the Gartner researchers examined, not one included a requirement for BPM certification. Instead, most were seeking hard skills such as Business Process Modeling Notation (BPMN) and Six Sigma, and soft skills such as change management.” — Anne Stuart|
Today’s WhatIs.com Word of the Day is business process professional. The Association of Business Process Management Professionals is offering a new certification for business process pros which is renewable every three years.
|“There are techniques that can determine the context of access — the type of device, where it’s accessing from, who the user is, [whether it’s] legitimate access to this data or application — and use those techniques to begin to build a policy around what is and what is not appropriate for these devices, which are usually not managed, period.” — Scott Crawford|
Today’s WhatIs.com Word of the Day is context-aware network access control (CANAC), an approach to managing the security by granting access to network resources according to contextual-based security policies. The endpoint device is granted access, quarantined or blocked from the network depending on the device’s type, location, identity and the operating system or applications running on it.
|If you ask different people in the data center world what ‘infrastructure’ means, you will get diverse answers. The same holds true for the current crop of DCIM offerings by various vendors. — Julius Neudorfer|
Today’s WhatIs.com Word of the Day is data center infrastructure management (DCIM), the convergence of IT and data center facilities functions within an organization. When properly implemented, DCIM can provide a holistic view of the facility and facilitate energy conservation to reduce data center operating expenses.