Word of the Day Archive


May 4, 2010  12:50 PM

Overheard talking about business analytics

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Business intelligence is sort of a marketing term that was made up to say, well, we can’t call ourselves a query and reporting company, we need to call ourselves something different. Let’s call ourselves “business” … um … make it ‘business intelligence.’

Dr. Jim Goodnight, SAS data analytics offers much more than BI from IBM, SAP

Today’s WhatIs.com Word of the day is business analytics.

This is an interesting term because nobody seems to agree whether there’s really a difference between business intelligence and business analytics — except the vendors.  Is BA just marketing hype to convince people to start buying software again?  Are BA products so different that they deserve a new name — or are vendors just rebranding a new and improved BI product?

An interesting observation from Dr. Goodnight has me thinking:

The growing popularity of analytics has been spurred in part by the demise of ERP. Most large companies already have their ERP systems in place and are looking for ways to get useful information out of those systems.

The demise of ERP? Another buzzword bites the dust and out of the ashes rises Business Analytics?

I sort of picture BA as a service that would aggregate all the unstructured data from disparate sources and hooks up to your traditional ERP so you can see both structured and unstructured data and create queries on the fly.

The promise of having this magical power is truly awesome. I think they should have picked a different name though. If I were a BA vendor, I’d call my new magic software “Actional Analytics.” It has a super-hero vibe.

May 3, 2010  2:36 PM

Overheard talking about cyberextortion

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
CSIS surveyed more than 600 IT and security executives who work for many of the companies that run critical infrastructure facilities. The survey found that one-in-five critical infrastructure entities reported being the victim of extortion through cyberattack or threatened cyberattack within the past two years.

Robert Westervelt, Security expert predicts criminals to take cyber extortion tactics to the U.S.

Today’s WhatIs.com Word of the Day is cyberextortion.


April 30, 2010  2:38 PM

Overheard talking about desktop as a service (DaaS)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
To create a true DaaS offering, a VDI environment needs a solid management framework, and the battle for this has just begun.

Brad Maltz, Virtual desktop infrastructures and the private cloud

Today’s WhatIs.com Word of the Day is desktop as a service.


April 29, 2010  7:23 PM

Overheard talking about a straw man argument and SOA

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
These are the situations where the SOA moniker is a straw man: “I was doing XYZ and called it SOA even though it wasn’t… XYZ failed, therefore SOA failed.” Well, we don’t have the time or money to play such games any more. SOA isn’t dead — what’s dead is the fake SOA straw man.

Jason Bloomberg, The rumors of SOA’s demise…

Today’s WhatIs.com Word of the Day is straw man.


April 28, 2010  6:10 PM

Overheard talking about multi-tenancy

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
In the early days of application hosting, service companies found themselves in the business of hosting individual instances of each application, meaning that each customer presented an altogether new application. The result was that there were no economies of scale, and individual customers were on individual instances of enterprise applications, frequently on individual server systems.

Daniel Taylor, Managed services for enterprise mobility

Today’s WhatIs.com Word of the Day is multi-tenancy.


April 27, 2010  6:08 PM

Overheard talking about unstructured data

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Unstructured data growth shows no signs of abating. It will make up the bulk of data growth in the data center in 2010, driving IT to take a long hard look at unified storage platforms, scale-out NAS and cloud storage services to alleviate the strain.”

Terri McClure, as quoted in NAS systems evolve to cope with unstructured data growth

Today’s WhatIs.com Word of the Day is unstructured data.


April 26, 2010  2:49 PM

Overheard talking about computerized physician order entry

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Doctors hate doing data entry. The faster it is to put in the data, the better the system from a doc’s perspective. The rub is that the most flexible and intuitive record to use is a blank sheet of paper.

Dr. Peter Deane, as quoted in Implementing EHR technology is easy; physician buy-in can be hard

Today’s WhatIs.com Word of the Day is computerized physician order entry (CPOE)

Because data entry is the principal point of conflict, what is the best method of data entry? Despite such technologies as handwriting recognition, speech recognition, touch-screen and stylus, the traditional pairing of keyboard and mouse is still the fastest and most reliable input method…


April 17, 2010  11:27 AM

Overheard talking about TechStat

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Part of what we want to do in the government is to not just terminate projects but make sure we turn them around so they deliver on their business cases.

Vivek Kundra, Failure to produce results puts IT projects on the chopping block

Government 2.0 could just be called Government BPM but it’s not as sexy or glittery in a headline. Also, Government BPM sounds kind of medical…blood pressure management? Although in a real sense, that’s exactly what it is. Getting information to flow throughout the government in a healthy, manageable way. The technology is just a means to an end. It also sounds a little like bowel movement though, and that’s not good. Better stick with Government 2.0 and leave everyone trying to guess what exactly it is.

The TechStat initiative brings OMB officials and agency leaders together for in-person meetings to review IT Dashboard results and feedback from citizens. After a TechStat session, OMB takes action on underperforming projects by canceling, halting or overhauling them.

I wonder if there’s any authority behind TechStat. Need to find out. Can they pull the plug on funding? Or is it just a PR move to keep citizens happy and scare IT project managers into getting their act together or pulling the plug themselves?


April 16, 2010  6:36 PM

Overheard talking about Trusted Internet Connections (TIC)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
“A single gateway represents a single point of failure, something that could bring a whole range of mission-critical business functions to a halt — unless some sort of fail-over redundancy is in place. And with fewer gateways, the servers must take on larger loads, and they are likely to require higher specs that could be more costly. They must be configured efficiently so that they don’t become bottlenecks.”

Michael Cobb, Is security improved when the number of Internet gateways is reduced?

Today’s WhatIs.com Word of the Day is Trusted Internet Connections.  The United States government would like to limit the number of public Internet connection points to 50, with each Agency having approximately two gateways.


April 15, 2010  2:57 PM

Overheard talking about Federal Desktop Core Configuration (FDCC)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
NASA would like to note that future guidance and configurations must keep pace with industry updates in common operating systems and applications. The FDCC technical guidance and policy releases tend to lag behind software releases. In order to remain relevant and viable, FDCC technical and policy development must advance at the pace of Federal Agency procurements of new commercial software.

Linda Cureton, Chief Information Officer, Agencies Need to Implement Federal Desktop Core Configuration Requirements

Today’s WhatIs.com Word of the Day is Federal Desktop Core Configuration (FDCC).


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: