Word of the Day: Tech Definitions from WhatIs.com


December 9, 2013  5:06 PM

Word of the Day: JAQL

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“Jaql’s query language was inspired by many programming and query languages, including Lisp, SQL, XQuery, and Pig.”Matous Havlena

Today’s WhatIs.com Word of the Day is JAQL, a query language for the JavaScript Object Notation (JSON) data interchange format. Pronounced “jackal,” JAQL is a functional, declarative programming language designed especially for working with large volumes of structured, semi-structured and unstructured data. JSON has found wide use in Web and mobile applications, including large-scale big data and enterprise data warehouse applications. Continued…

Related Terms

JSON
big data analytics
Hadoop
MapReduce
Hive
XQuery

Related Reading

How essential is a Hadoop infrastructure to a big data environment?
While using a Hadoop infrastructure with big data is a common practice, it has a number of drawbacks.

JavaOne 2013: Pairing REST and JSON to build APIs
Get tips for building REST and JSON APIs from a presenter at JavaOne 2013.

MetLife fires up Synapse and JSON to recruit rock-star developers
How to find rock-star developers, Twitter versus Facebook, the DNA diet and anonymous Web searches: The Data Mill reports.

Quiz Yourself

What do you call a a billion terabytes?
b. billabyte
a. yottabyte
c. zettabyte
Answer

December 6, 2013  12:49 PM

Word of the Day: CISO

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“Back when I first got into information security, it was about building a firewall and installing anti-malware. Now, it’s a broader risk management environment.”David J. Sherry

Today’s WhatIs.com Word of the Day is CISO (chief information security officer), a senior-level executive responsible for aligning security initiatives with enterprise programs and business objectives, ensuring that information assets and technologies are adequately protected. The CISO’s responsibilities have shifted over the years from general security to identifying, developing, implementing and maintaining security-related processes that reduce the organization’s operational risks. Continued…

Know IT All

operational risk
risk appetite
identity access management system
e-discovery
clean desk policy
security policy
end user policy
CISSP

Related Reading

Reducing the average cost of a data breach
Expert Ernie Hayden explores the role the CISO plays in breach prevention.

How to move from security technologist to CISO
Becoming a CISO requires you to set long- and short-term goals for building business management skills.

Opinion: The role of the CISO
Craig Shumard says the CISO role within many organizations is being redefined in ways that make it harder to create real security.


December 5, 2013  1:27 PM

Word of the Day: intrapreneur

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“Innovation — ideas — are like sparks, and it is very easy to extinguish them. There are a lot of people who can say ‘No’ and stomp them out. That’s a dangerous thing, so we put structures in place with the goal of encouraging those sparks, fanning the sparks.”Tom Leighton

Today’s WhatIs.com Word of the Day in intrapreneur, an employee who is given the authority and support to create a new product without having to be concerned about whether or not the product will actually become a source of revenue for the company. Unlike an entrepreneur, who faces personal risk when a product fails to produce revenue, an intrepreneur will continue to receive a salary even if the product fails to make it to production. Continued…

Related Terms
entrepreneur
social entrepreneur
continuous improvement (kaizen)
skunkworks
Amazon Prime Air drone
3-D printing
social coding

Related Reading
Business innovation and collaboration
Business innovation and collaboration are two sides of the same coin. If CIOs want to help their companies outpace competitors, they need to facilitate both.

Software product success
SearchSoftwareQuality expert Scott Sehlhorst explains why maintaining customer focus and encouraging innovation are crucial to delivering high-quality, successful software products.

Factory of the future
Learn about the future of order fulfillment and the part 3-D printing and make-to-order inventory will play.


November 27, 2013  4:28 PM

Word of the Day: patent troll

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“The killer horror about software patents and their even vaguer cousins, business method patents, is that there are so many of them out there. So many of them are so stupidly broad that any software you write will almost certainly violate someone’s patent.” — Robin Miller

Today’s WhatIs.com Word of the Day is patent troll, an individual or an organization that purchases and holds patents for unscrupulous purposes such as stifling competition or launching patent infringement suits.

Patents frequently describe a general concept rather than a product or process; furthermore, the patent may not define what it protects in adequately precise terms. Both of those situations render the patent system vulnerable to abuse. In 2011, for example, a patent assertion entity called Innovatio threatened to sue 8,000 hotels, stores and coffee shops in the United States, claiming that the use of Wi-Fi infringed upon 17 of its patents. Continued…

Related terms:

patent
intellectual property
competitive advantage
competitive intelligence
full and open competition

Quiz Yourself

What is data sovereignty?
a. the concept that digital data is subject to the laws of the country in which it is located.
b. the management and oversight of an organization’s data assets.
Answer

Related Reading

Patent trolls invade the cloud: What the attack means for providers
Patent trolls are setting their sights on the cloud, looking to capitalize on an expanding market with plenty of complex software descriptions to exploit.

Business method patents ruling could spell relief from patent trolls
Business method patents have created a legal minefield, but the landscape may be altered by a court decision that could rewrite business method patent law.

In the CIO Searchlight
This week’s Searchlight covers clamp-downs on data brokering and patent trolling. Plus: Say it loud, say it proud, “The HealthCare.gov glitches are not IT’s fault.”


November 22, 2013  3:52 PM

Word of the Day: CRUSH

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“CRUSH is an algorithm that can calculate the physical location of data in Ceph, given the object name, cluster map and CRUSH rules as input.”Dmitry Ukov

Today’s WhatIs.com Word of the Day is CRUSH (Controlled Replication Under Scalable Hashing), a hash-based algorithm for calculating how and where to store and retrieve data in a distributed object–based storage cluster. Continued…

Related Terms

hashing
algorithm
distributed file system
clustered storage
object storage
Ceph

Quiz Yourself

Which is the smallest unit of data in a computer?
a. bit
b. byte
Answer

Related Reading

Open source distributed file system (DFS) solutions go beyond Windows
Learn about free open source distributed file system (DFS) solutions that fall outside the Microsoft Windows Server OS, such as Ceph, GlusterFS and MooseFS.

Inktank supports new enterprise release of open source Ceph storage
Inktank releases new subscription-based enterprise version of open source Ceph storage software, featuring graphical management tools and enhanced support services.

Parsing through the software-defined storage hype
For nearly a decade, the Ceph open source project has been developing software that allows anyone to build massively-scalable unified storage with commodity hardware.


November 21, 2013  2:27 PM

Word of the Day: MiFi

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

“The Mi-Fi is just one example of a 3G/Wi-Fi pocket router – some others include the CradlePoint ClearSpot and the Sierra Wireless Overdrive.” — Lisa Phifer

Today’s WhatIs.com Word of the Day is MiFi, a portable broadband device that allows multiple end users and mobile devices to share a 3G or 4G mobile broadband Internet connection and create an ad-hoc network. Although MiFis are manufactured by Novatel, the name is often used as a generic label for any device capable of becoming a personal hotspot or pocket router. Continued…

Related Terms

BYON
hot spot
wireless router
tethering
ad-hoc network
personal area network

Quiz Yourself
You have traveled back in time to the year 2002, only to discover that everyone is talking about warchalking. What the heck was warchalking?
a. a grass roots effort to create a standard iconography for public Wi-Fi access.
b. a grass roots effort to map politically motivated malware attacks.
Answer

Related Reading

The implications of mobile hotspot security vulnerabilities
Mobile hotspot security vulnerabilities in 3G and 4G modems can put enterprises at risk. Learn how to protect users and ensure wireless hotspot security.

European hotspots rip off Wi-Fi users
Almost all mobile workers have had personal experience of excessive Wi-Fi fees. According to iPass, hotels and airports are the main perpetrators.

No network connection? Mobile workers can stay productive offline
Mobile workers that rely on cloud services expect network connectivity, but are there offline technologies for productivity when Wi-Fi isn’t available? Yes!


November 19, 2013  1:56 PM

Word of the Day: leaky feeder

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“Setting up a wireless LAN is more of an art than a science.”
Mike Jude

Today’s WhatIs.com Word of the day is leaky feeder, a coaxial cable that has small sections of its copper shielding stripped away to allow radio frequency (RF) signals to escape. Leaky feeders, which act as extended antennas, are also called radiating cables. Leaky feeders are often used in structures with metal frameworks such as skyscrapers, tunnels, ships and planes to extend mobile coverage.  Continued…

Related Terms

coaxial cable
amplifier
wireless LAN
access point
802.11ac

Quiz Yourself

What does an antenna do?
a. converts radio-frequency fields into alternating current and vice-versa.
b. increases the voltage, current or power of a signal.
Answer

Related Reading

Ten questions to ask WLAN vendors when evaluating WLAN solutions
The wireless LAN (WLAN) has grown from a convenience to a complete networking solution.

New standards help administrators increase enterprise WLAN capacity
Combined, the new 802.11ac and 802.11ad standards will ultimately allow admins to increase enterprise WLAN capacity, offering amplified user density and higher data rates.

The importance of WLAN testing: From planning to documentation
This chapter on WLAN testing covers WLAN test planning and documentation and crucial testing methods for performance, security and signal coverage.


November 18, 2013  1:43 PM

Word of the Day: fruit of a poisonous tree

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“Even if you own a network or are responsible for its security and maintenance, you may not have the unfettered right to watch what network users are doing.”Richard P. Salgado

Today’s WhatIs.com Word of the Day is fruit of the poisonous tree, a legal doctrine according to which any secondary evidence obtained indirectly through illicit means is inadmissible in court. Examples of such sources include evidence gained through eavesdropping, illegal wiretapping, coercive interrogations, unwarranted searches or improperly conducted arrests. Information obtained from those sources is inadmissible according to the law of exclusion.  Continued…

Related Terms

eavesdropping
electronic discovery
wiretap Trojan
government Trojan
hackerazzi

Quiz Yourself

What do you call the the destruction, alteration, or mutilation of evidence that may pertain to legal action?
a. spoliation
b. spoilation
Answer

Related Reading

ARMA 2013: Cloud, mobile-related e-discovery complications
In this Q&A with ARMA 2013 speaker Veeral Gosalia, learn how mobile devices and the cloud are complicating how organizations approach e-discovery strategy.

Guide to managing the e-discovery process
Although e-discovery can be complicated, time-consuming and expensive, it is necessary in order to avoid the costly fines associated with non-compliance.

Can You Hear Me Now? Gov’t. Surveillance and ‘Metadata’
Davis Scott blogs about the controversy surrounding U.S. government surveillance of the Internet and phone calls.


November 14, 2013  2:34 PM

Word of the Day: UE virtualization

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“With nonpersistent virtual desktops, a single disk image is shared among many users. As each user logs in, he gets a clone of the master desktop and then that clone is customized on demand with app virtualization or with user environment virtualization.”Brian Madden

Today’s WhatIs.com Word of the Day is user environment virtualization, the abstraction of personalized computer settings from an end user’s operating system and applications. User environment virtualization software allows desktop and application virtualization users to keep personalized settings — such as desktop wallpaper and browser bookmarks — even though the operating system and software applications come from a standardized template or golden image shared by everyone. These persistent settings can follow users from session to session and from one physical machine to another in a nonpersistent virtual desktop infrastructure. Continued…

Related Terms

VDI
nonpersistent desktop
persistent desktop
golden image
app virtualization
Microsoft UE-V

Quiz Yourself

What does the Infinite Monkey Theorem propose?
a. given infinite time, random input should produce all possible output.
b. the universe is partitioned to accommodate every possible outcome of an event.
Answer

Related Reading

Taking advantage of nonpersistent VDI for one-off applications
There are still uses for nonpersistent virtual desktops, especially when you are supporting specialized applications for a small number of employees.

How to handle peripherals support on virtual desktops
Learn how peripherals support is handled by the major VDI vendors.

Persistent VDI vs. non-persistent VDI and their effect on storage resources
Learn the difference between persistent VDI and non-persistent VDI and how they affect storage in terms of capacity and backup requirements.


November 13, 2013  2:39 PM

Word of the Day: rolling forecast

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Overheard

“It’s no secret that the BYOA trend creates new security challenges. Internal applications typically rely on firewalls, but best practices for cloud-based services usually rely on secure passwords and encryption technologies.”Chris Moyer

Today’s WhatIs.com Word of the Day is rolling forecast, an add/drop process for predicting the future over a set period of time. Rolling forecasts are often used in long-term weather predictions, project management, supply chain management and financial planning. If, for example, an organization needs to anticipate operating expenses a year in advance, the rolling forecast’s set period of time would be 12 months. After the first month had passed, that month would be dropped from the beginning of the forecast and another month would be added to the end of the forecast. Because a rolling forecast window requires routine revisions, it is sometimes referred to as a continuous forecast or an iterative forecast. Continued…

Related Terms

BPF
predictive analytics
demand planning
fiscal year

Quiz Yourself

A rolling forecast budget uses a FIFO approach for time. What does FIFO stand for?
a. first in/first out
b. financial information/forecast ongoing
Answer

Related Reading

Rolling forecast model can improve usefulness of financial data
Should you adopt a rolling forecast model to replace slow and broken processes?  You won’t need a crystal ball to guess the answer.

Gartner Symposium forecast: Cloudy with a good chance of 3-D printing
This CIO Searchlight shares some predictions from the Gartner Symposium along with some innovation news from Disney.

Which budget technique is right for your organization?
Explore which approach to forecasting budget requirements meets your organization’s needs.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: