“While DevOps just handles deployment, WebOps goes further into managing the business activity of the application. It ensures proper infrastructure capacity for that process, automating systems software in general — including data base servers, CRM systems and ERP systems.” — Matt Heusser
“Consider gamifying your knowledge management system. A badge that says this person is really knowledgeable about a product or process is one of the truly valuable badges in any company, and it gives status to your best employees and your best contributing customers.” — Denis Pombriant
Today’s WhatIs.com Word of the Day is knowlege management. Knowledge management involves data mining and some method of operation to push information to users. A knowledge management plan involves a survey of corporate goals and a close examination of the tools, both traditional and technical, that are required for addressing the needs of the company. The challenge of selecting a knowledge management system is to purchase or build software that fits the context of the overall plan and encourages employees to use the system and share information.
“One of the main attractions of traditional NAS is its simplicity. The systems are easy to install, configure, manage and operate, especially in environments of modest scale.” — Carol Sliwa
Today’s WhatIs.com Word of the Day is network-attached storage (NAS), a dedicated hard disk storage device that is set up with its own network address and provides file-based data storage services to other devices on the network.
“Social media listening has, by many measures, replaced focus groups and phone surveys. But those old-school approaches still have a role to play, according to marketers and industry observers.” — Sue Hildreth
Today’s WhatIs.com Word of the Day is social media listening, the the process of identifying and assessing what is being said about a company, individual, product or brand on the Internet. Sue Hildreth says that both social media and person-to-person information-gathering have value, but social media listening is quickly becoming the primary customer intelligence tool.
In the article referenced above in her quote, she points out several ways to use social media to get consumer insight, including online customer support forums, monitoring tools to gather comments from social outlets such as Facebook and Twitter, and crowdsourcing software that enables customers to suggest new product features and vote on their favorites.
“At first glance, a battle-hardened system administrator might dismiss a new configuration management tool as unnecessary. She can do the same thing with machine images and some shell scripts. This is equivalent to a lumberjack who has just heard about chainsaws and doesn’t see why anyone would ever want more than an ax.” — Andrew Shafer
Today’s WhatIs.com Word of the Day is Puppet, an open source IT automation tool that allows IT organizations to encode the configuration of services as a policy, which the framework then audits and enforces.
“Don’t recognize a lot of the names? The searches are almost 100% Dancing With The Stars-related searches… People have their priorities.” — Joe Weisenthal
Today’s WhatIs.com Word of the Day is Google Trends, a search tool that allows the user to see how often specific keywords, subjects and phrases have been queried over a specific period of time.
“In the hyperscale market they’re building their own systems and a single controller is good. It’s one less failure point. For these types of organizations, it costs more to send people out to change a drive than it does to just failover to another server. They want to rack-and-stack and if something breaks they fail the workload over. The server is the unit of failure. In the enterprise the drive or memory module is the unit of failure.” — David Flynn
Today’s WhatIs.com Word of the Day is hyperscale computing, a distributed computing environment in which the volume of data and the demand for certain types of workloads can increase exponentially, yet still be accommodated quickly in a cost-effective manner.
“The ability to remotely wipe any managed device is a staple of many enterprise mobile security policies, and it’s vital to preventing sensitive corporate data from being compromised.” — Lisa Phifer
Today’s WhatIs.com Word of the Day is enterprise wipe, a security feature offered by many mobile device management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM.
“There are two main types of buffer overflow attacks: stack based and heap based. Heap-based attacks flood the memory space reserved for a program, but the difficulty involved with performing such an attack makes them rare. Stack-based buffer overflows are by far the most common.” — Brien Posey
Today’s WhatIs.com Word of the Day is stack overflow, an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In programming, the call stack is a buffer that stores requests that need to be handled.
“Users of Apple’s mobile devices are generally less likely to want to jailbreak their devices because they want to be able to update to the latest authorized OS version and take advantage of new features.” — John Girard
Today’s Whatis.com Word of the Day is jailbreaking, the removal of manufacturer or carrier restrictions from a device.