Word of the Day: Tech Definitions from WhatIs.com

September 20, 2016  3:01 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Unified Communications, WebRTC

WebRTC (Web Real-Time Communications) is an open source project that seeks to embed real-time voice, text and video communications capabilities in Web browsers. Continued…

Quote of the Day

“WebRTC doesn’t really mean you no longer need servers to negotiate and connect a call. It just means, in many cases, you’ll be able to communicate directly between browsers.” – Tsahi Levent-Levi

Learning Center
How has the WebRTC codec clash affected adoption?
WebRTC expert Tsahi Levent-Levi examines the effect of the WebRTC codec clash on vendor and business adoption of the technology.

What WebRTC applications will and won’t do for enterprises
UC analysts and vendors discuss what emerging WebRTC applications will offer enterprises, as well as misconceptions around the pre-standardized protocol for ubiquitous voice and video conferencing.

What is a WebRTC server and how does it connect calls?
A WebRTC server is actually a collection of back-end servers, including signaling and media servers, which negotiate Web-based calls.

What are best practices for managing WebRTC services?
WebRTC expert Tsahi Levent-Levi discusses best practices to manage WebRTC services, like WebRTC voice and video, to maintain a consistent user experience.

Understand WebRTC basics to maximize deployment and adoption
Learn about the WebRTC basics in this essential guide, including the technology’s features, security concerns and use cases.

Related Terms

Related Tags
Communication integration with enterprise applications
Unified communications achitecture and service models

September 16, 2016  2:42 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
HTTPS, Security

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued…

Quote of the Day

“Installing a digital certificate and providing users with the ability to make HTTPS connections to your Web server is one of the simplest ways you can add security to your website and build user confidence in conducting transactions with you over the Web.” – Mike Chapple

Learning Center
Google to tweak Chrome browser security in 2017, flag HTTP as insecure
Google plans to level up Chrome browser security by flagging unencrypted HTTP payment or login pages as insecure, starting in 2017.

Google boosts HTTPS, Certificate Transparency to encrypt Web
Google pushes HTTPS, Certificate Transparency log viewer and more support for Web encryption, as other tech firms eye expanding strong encryption.

HSTS: How HTTP Strict Transport Security enhances application security
Application security expert Michael Cobb reveals whether HTTP Strict Transport Security (HSTS) truly offers better application security than HTTPS.

What HTTP/2 means to the data center and its security
HTTP/2 responds to the need for less latency and higher performance when retrieving and exposing richer Web content. See what improvements come in the upgrade.

How can an HTTP referer header help maintain user Web privacy?
Learn the pros and cons of an HTTP referer header and discover why one can be critical to ensuring user Web privacy.

Related Terms
digital certificate
certificate authority

Related Tags
Web browser security
Network protocols and security

September 14, 2016  9:08 PM

KVM hypervisor

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hypervisor, KVM, Virtualization

KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM). In KVM, the Linux kernel acts as a Type 2 Hypervisor, streamlining management and improving performance in virtualized environments. Continued…

Quote of the Day

“Kernel-based Virtual Machine (KVM) contains virtualization extensions that boost security and performance, and allows organizations to deploy multiple VMs running unmodified Linux or Windows images.” – Jim O’Reilly

Learning Center
Will Nutanix’s KVM-based hypervisor shake up VMware?
Using a KVM-based hypervisor, Nutanix Acropolis is hitting VMware in the wallet for what many feel are exorbitant licensing fees.

Xen vs. KVM Linux virtualization hypervisors
Which side wins in the Xen vs. KVM Linux virtualization hypervisor debate? Two IT experts weigh-in with their Xen-KVM comparisons.

Quiz: KVM hypervisor and virtual infrastructure management
Take this quiz on the KVM hypervisor to test your knowledge on KVM virtual machine management and the differences between Xen and KVM virtualization.

Support for multiple hypervisors could solidify VMware’s future
As more companies work with Linux, it makes sense for VMware to consider KVM first if it wants to add management support for multiple hypervisors.

How end users can access VMs with virt-manager
End users using virt-manager to access virtual machines on a KVM hypervisor isn’t always convenient, but it’s not impossible.

Related Terms
Type 2 hypervisor

Related Tags
Open source virtualization
Virtualization technology and services

September 13, 2016  8:46 PM

ROT (redundant, outdated, trivial information)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data quality

ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value. Continued…

Quote of the Day

“ROT is created very simply by hoarding information. It’s information that organizations hang onto with the mindset of keeping it ‘just in case.’” – Pamela Doyle

Learning Center
Big data doesn’t mean big intelligence … unless you work at it
For BI, big data can be a vital part of the range of data sources that each business department uses. However, the aim should be to make users smarter in their daily activities.

Too much business information? It’s not a new problem
The business information “explosion” has brought the problem into sharper relief, but there has long been too much data. Sorting through it is the real issue.

Content analytics becomes an enterprise must-have
As companies increasingly use content for an array of operations, they are recognizing that content analytics is central to improved operations.

How much data is too much for cloud gateways?
Enterprises with up to 50 TB of data may find public cloud storage attractive given the local storage limits of the current cloud gateways, says Gartner analyst.

Better data quality process begins with business processes, not tools
Efforts to improve the data quality process should start with an assessment of data problems and procedural changes to help avoid them, then the possible addition of data quality tools.

Related Terms
regulatory compliance
predictive coding
information governance

Related Tags
Data quality techniques and best practices
Managing governance and compliance

September 12, 2016  8:10 PM

columnar database

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

A columnar database is a database management system (DBMS) that stores data in columns instead of rows. Continued…

Quote of the Day

“Columnar database technology lets you go deeper in big data analytics, speeds up enterprise reporting and cuts down on the number of administrators needed for storage.” – Wayne Kernochan

Learning Center
A look inside the SAP IQ column-oriented database
The SAP IQ 16 column-oriented database can be used to deploy decision support, business intelligence, data warehouse and data mart implementation.

Why columnar database technology should matter to IT
A columnar database handles data differently than a relational database and can improve big data and enterprise applications. Here’s how it works and how the vendor offerings differ.

What’s available in columnar databases
Appliances for columnar databases compete with — and sometimes work alongside — relational database offerings in various ways. We take a look at the four main vendors for columnar databases.

GPU database serves up analysis of tweets, other data feeds
A Harvard and MIT researcher found benefits in use of a GPU database over techniques such as Hadoop for analytics on massive numbers of social tweets.

How to justify the purchase of a data integration tool
With big data everywhere, data integration is more vital than ever. Explore how a data integration tool can help address your enterprise’s needs.

Related Terms
database management system
in-memory analytics

Related Tags
DBMS architecture design and strategy
Data warehouse software

September 9, 2016  6:44 PM

recommendation engine

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data Science, Machine learning, Predictive Analytics

A recommendation engine, also known as a recommender system, is software that analyzes available data to suggest something that an end user might be interested in such as a website, a book, an article of clothing, a video or a job. Continued…

Quote of the Day

“What’s coming down from larger-scale data that we want to induce things from is using machine learning with recommendation engines to say ‘You may not have known it, but based on the patterns we see, here’s what you need to look into.'” – Ritika Gunnar

Learning Center

Data science industry eyes machine learning, recommendation engines
The data science industry isn’t waiting for you. Developers, it’s time to get educated on machine learning and recommendation engines or get left behind.

Semi-structured data is king of LinkedIn’s recommendation engine
LinkedIn’s semi-structured data shines, CVS responds to social media finger wagging, and Microsoft does the shuffle, The Data Mill reports.

Online music startup picks a recommendation engine
Neil Young’s PonoMusic opted for Datameer platform software to field a site recommendation engine. The goal: Give users the feel of a vinyl store of yore

Data scientists benefit when they pay attention to tools for big data
Data scientists may not like spending time on tools for big data, but doing so can pay off in better analyses and more time to do real data science.

Fashion tech startups use data science to build virtual dressing rooms
Fashion tech startups Virtusize, Clothes Horse and LoveThatFit are solving online fashion’s fit problem.

Related Terms

predictive analytics
machine learning
predictive modeling

Related Tags

Enterprise data architecture best practices
Enterprise business intelligence software

September 8, 2016  8:14 PM

overlay network

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Networking, SDN, Virtualization

An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure. Continued…

Quote of the Day

“Overlay networks create virtual network containers that are logically isolated from one another even though they share the same underlying physical network.” – Lee Doyle

Learning Center

LAN SDN management looks to the cloud and causes LAN ghost towns
As campus LANs move from on premises to the cloud, they’ll need automated LAN SDN management, which will create new network manager opportunities.

Overlay networks: Understanding the basics, making it a reality
Network overlays place a virtual network over the physical infrastructure for dynamic provisioning and orchestration of network resources.

Is fabric necessary for network virtualization overlay?
A network virtualization overlay can work just fine without a fabric underpinning, according to a network expert.

Network virtualization now, and the overlay network future
In part 1, expert Jim Metzler examines network virtualization (NV), including traditional approaches and emerging developments like overlay networks.

Overlay networks could revolutionize ISP backbone
Overlay networks aren’t just for the data center. ISPs can’t ignore the reduced Opex and increased agility that network overlays could bring to backbone networks.

Related Terms

SDN overlay
virtual private network
content delivery network

Related Tags

Network overlay software
SDN network virtualization

September 7, 2016  6:25 PM

leet speak

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hacking, Programming, Security

Leet speak, also known as hackspeak or simply leet, is the substitution of a word’s letters with numbers and/or special characters. Continued…

Quote of the Day

“I take a word and use ‘hacker speak’ to substitute numbers or special characters in place of some letters. That way I can still remember the password, and it won’t be cracked by a simple dictionary attack or easy guess. For instance, instead of using ‘october,’ change it to ‘oct0b3r.'” – Tony Bradley

Required Reading

How effective are password hack tools?
Learn how password hack tools are being used in combination with Nvidia Graphics card and rainbow tables to crack WPA and Wi-Fi credentials. Make sure to create a strong password, even with the Leet alphabet.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

Expert how-tos: Creating strong passwords
In this tip, five Windows-security experts respond to the question, “How do you create strong passwords?”

Business security begins with a strong password policy
A sound password policy alone won’t guarantee your company’s security, but you have little chance without one.

How to build complex passwords and avoid easy breaches
Password problems are leading to easy data breaches like the recent celebrity iCloud hack. Expert Keith Palmgren discusses how to build unpredictable and complex passwords.

Related Terms

strong password
dictionary attack
private key

Related Tags

User passwords and network permissions
Hacker tools and techniques, underground sites and hacking groups

July 30, 2014  1:58 PM

Explaining SMAC (social, mobile, analytics and cloud)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

WhatIs.com Word of the Day

SMAC (social, mobile, analytics and cloud) is the concept that four technologies are currently driving business innovation. SMAC creates an ecosystem that allows a business to improve its operations and get closer to the customer with minimal overhead and maximum reach. None of the four technologies can be an afterthought because it’s the synergy created by social, mobile, analytics and cloud working together that creates a competitive advantage.

Quote of the Day

“Social, mobile, analytics and cloud technologies (SMAC) are the front runners in disruptive technologies driving business innovation…” – Karl Flinders

Related Terms

1:1 marketing
customer analytics
mobile location analytics
Nexus of Forces
loyalty card program
social media analytics
cloud analytics
social login
disruptive technology
data broker

Related Tags

Customer privacy and data security
Commerce technology and strategy

Required Reading

From smoke signals to SMAC, digital business arrives
Harvey Koeppel analyzes how social media, mobile, analytics and cloud technology has transformed business communications. It’s time for CIOs to get their SMAC on.

Talking SMAC with Dell CIO Andi Karaboutis
Dell CIO Andi Karaboutis talks about the demand for SMAC and self-service analytics.

CIO Interview: Lance Fisher, CIO, SThree
Learn why sThree CIO Lance Fisher’s IT strategy revolves around around SMAC.

A guide for CIOs: SMAC strategy and governance
Read this Essential Guide to learn how SMAC technologies are changing the way businesses run. Explore the benefits of a SMAC strategy and find expert tips on SMAC governance best practices.

July 28, 2014  1:57 PM

hardware-as-a-service (HaaS)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day

Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing. In the hardware-as-a-service model, hardware that belongs to a managed service provider (MSP) is installed at a cutomer’s site and a service level agreement (SLA) defines the responsibilities of both parties.

Quote of the Day

“Vendors as well as distributors and independent finance companies are being forced to be more dynamic with their offerings as customers grow fond of paying for IT solutions on a monthly recurring payment model as an operating expense, with little interest in owning anything.” – Lynn Haber

Related Terms

customer premises equipment
managed service provider (MSP)
managed IT service
infrastructure-as-a-service (IaaS)
managed hosting

Related Tags

MSP Business Model

Required Reading

Plantronics’ new hardware as a service UC devices complement UCaaS
Plantronics is offering a hardware as a service program which will bundle the costs of UC devices with UCaaS offerings.

Server refresh options: When to rent a server vs. when to buy
Companies should look at financing options when deciding whether to rent a server or buy a server.

Should you lease or buy network equipment?
You might not think twice about leasing a car or renting an apartment, but what about your switches and routers?

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: