Word of the Day: Tech Definitions from WhatIs.com


September 15, 2017  3:58 PM

Amazon Simple Notification Service (SNS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
AWS, Pull notifications

Amazon Simple Notification Service (SNS) is a cloud service for coordinating the delivery of push messages from software applications to subscribing endpoints and clients. Continued…

Quote of the Day

“Push architectures can reduce CPU and network usage and bring greater energy efficiency to mobile devices.” – George Lawton

Learning Center
Compare Amazon SNS to other push notification services
These push notification services from the big three cloud providers enable mobile app messaging and let developers focus on coding application logic.

Can AWS push notifications improve service performance?
AWS push notifications can be harbingers of bad news, but they provide a necessary service for IT teams operating in the AWS cloud.

Amazon cloud services: What’s new?
Expert Chris Moyer discusses whether Amazon cloud services are new or simply updates of older services.

Find an AWS messaging service to fit your needs
AWS messaging services meet different enterprise needs. Choose carefully between Amazon SQS and SNS to ensure you’re using the right system for the job.

Real-time app development helps minimize delays
AWS provides several services for real-time app development, but developers must be careful to reduce delays throughout the development pipeline.

Trending Terms
Amazon Simple Queue Service
AWS Management Console
application program interface
push notification
Amazon Device Messaging
pull notification

Quiz Yourself
_______ notfications are CPU-intensive because they must continually poll a remote server.
a. Push
b. Pull
Answer

September 14, 2017  7:59 PM

content marketing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Content Management, Content marketing

Content marketing is the publication of material designed to promote a brand, usually through a more oblique and subtle approach than that of traditional push advertising. Continued…

Quote of the Day

“If we come up with a great idea today, but can’t execute it until next month, it’s worthless in real-time content marketing.” – Blair Hammond

Learning Center
The dos and don’ts of brand content marketing
As consumers get savvier about avoiding traditional advertising, companies are turning to brand content marketing to become trusted providers of information.

Thought leadership content marketing: How the IT channel can benefit
Learn how thought leadership content marketing can help IT channel firms build their businesses’ reputations in the industry and generate new leads.

Five common pitfalls in content marketing strategies
While it may seem hard to believe, companies aren’t yet convinced that they need content marketing strategies to be successful.

Creating an effective content marketing strategy
A content marketing strategy starts with homing in on customer experience and aligning technology and processes with it.

Content marketing strategies can soar — or fall flat
Too often, companies’ content marketing strategies lack insight into what content resonates with target audiences and prompts action like sales.

Trending Terms
push advertising
native advertising
gated content/ungated content
content management application
digital marketing
snackable content

Quiz Yourself
______ marketing often uses traditional offline advertising methods like flyers, magazines, television, radio and billboards.
a. Pull
b. Push
Answer


September 13, 2017  3:39 PM

storage snapshot

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Data protection, Disaster Recovery, Snapshot

A storage snapshot is a set of reference markers for data at a particular point in time. Continued…

Quote of the Day

“Storage snapshots act almost like a rewind feature for admins, enabling them to roll back to uncorrupted versions of data. Unfortunately, they aren’t as simple as hitting a button.” – Jim O’Reilly

Learning Center
Implement cloud storage snapshots to protect critical data
Cloud storage snapshots let admins roll back to uncorrupted versions of data. Learn how often to take them, and prepare for these potential issues.

Snapshot management tool adds intelligent data management
Copy data management innovator Catalogic updates ECX snapshot management tool to version 2.6, supporting a broader number of databases and file systems.

When does storage snapshot technology work best?
Learn why storage snapshot technology is best equipped for certain rollbacks, and when to use it for application server protection.

Everything you need to know about snapshotting
Jason Buffington looks at how snapshotting works, why storage snapshots matter, different snapshot mechanisms and how to get more from them.

How to choose the right snapshot method
Snapshots and replication are popular data protection tools, but they present challenges. Learn how to find the right snapshot method for your data center.

Trending Terms
data protection
virtual hard disk
disaster recovery
tree structure
continuous data protection
backup

Quiz Yourself
Data _____ is used for long-term data retention of information not needed for everyday operations.
a. archiving
b. backup
Answer


September 12, 2017  6:14 PM

natural language processing (NLP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
IBM Watson, Machine learning, NLP

Natural language processing (NLP) is the ability of a computer program to understand human speech as it is spoken. Continued…

Quote of the Day

“The new wave of enterprise interfaces will rely on natural language processing and generation, visual analytics and gesture interpretation — technologies powered by AI.” – Nicole Laskowski

Learning Center
Three trends to keep top of mind when crafting an AI strategy
When developing an AI strategy, CIOs should consider three trends, according to Gartner analyst Whit Andrews.

NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.

Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.

Health IT experts discuss how they’re using NLP in healthcare
NLP in healthcare will become increasingly important. Two health IT experts discuss how they’re using NLP in their healthcare organizations.

The relationship between population health and NLP in healthcare
Two health IT experts discuss NLP in healthcare and the role it plays in achieving population health.

Trending Terms
machine learning
deep analytics
opinion mining
IBM Watson supercomputer
cognitive computing
named entity

Quiz Yourself
_____ learning algorithms are stacked in a hierarchy of increasing complexity and abstraction.
a. Deep
b. Machine
Answer


September 11, 2017  5:20 PM

Bayesian statistics

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cognitive computing, Machine learning, predictive modeling

Bayesian statistics is a mathematical approach to calculating probability in which conclusions are subjective and updated as additional data is collected. Continued…

Quote of the Day

“If we’re going to live in a world where things are going to be driven by algorithms, we have to be able to convey their ambiguity.” – Donald Farmer

Learning Center
AI analytics expected to rise, along with management complexity
The use of AI analytics applications and the complexity of managing them are both likely to grow, according to predictions by consultants and vendor execs.

Security looks to machine learning technology for a cognitive leg up
Machine learning technology has proven to work well for some information security tasks, acting as a cognitive leg up for security managers and analysts.

Right data mining data sets are a must for proper predictive modeling
To help avoid analytics errors, data scientists need to be careful when choosing the data mining data sets they use to build predictive models.

Analytics VP: AI projects must be built on a good data foundation
The less-hyped aspects of AI projects, which include data governance, can’t be rushed if companies want to take advantage of the technology.

Think different: Cognitive computing systems will bring data-led change
Cognitive computing systems will replace old programming models and devise applications based on data.

Trending Terms
predictive modeling
Bayesian logic
cognitive computing
machine learning
deep learning
probability

Quiz Yourself
This is the simulation of human thought processes in a computerized model.
a. cognitive computing
b. machine learning
Answer


September 8, 2017  8:45 PM

air gapping

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Faraday, malware, security awareness

Air gapping is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. Continued…

Quote of the Day

“One of the most effective defenses against large scale cyberattacks on critical infrastructure is to establish separate, air-gapped networks that provide a physical line of defense.” – Ken Spinner

Learning Center
Dragonfly 2.0 hacker group seen targeting U.S. power grid
Security researchers tracked the Dragonfly 2.0 hacker group as it used social engineering attacks in order to set up persistent infections on ICS networks.

Using a software-defined perimeter to create an air-gapped network
Learn how the Cloud Security Alliance’s software-defined perimeter can help enterprises build a dynamic, air-gapped network using the cloud.

Best practices for implementing an enterprise network air gap system
Brad Casey discusses how to implement the network air gap system security concept in order to improve protection against advanced attacks in the enterprise.

Protection against ransomware requires strong backup
One of the keys in protection against ransomware is implementing a solid data protection strategy that includes having data spread across different media.

Separate but equal: Mitigating the risk of Web-borne malware infections
Web-borne malware infections are a key threat to systems, but systems have to be running to be harmed. Separation is an effective method to reduce the potential damage of a malware attack.

Trending Terms
Faraday cage
van Eck phreaking
security awareness training
Stuxnet
Tempest
acoustical infection

Quiz Yourself
This is a type of malware designed to obtain administrator-level access to the victim’s system.
a. rootkit
b. Trojan horse
Answer


September 7, 2017  4:49 PM

consignment inventory

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Inventory Management, Supply Chain Management

Consignment inventory is a supply chain model in which a product is sold by a retailer, but ownership is retained by the supplier until the product has been sold. Continued…

Quote of the Day

“Tackling the inventory challenge requires investment, but it can be attained quickly via real-time connectivity and sophisticated orchestration across different systems.” – Oliver Guy

Learning Center
What can a materials planner do to better manage inventory?
A materials planner is in the tricky position of ensuring the right balance of inventory. Here’s some advice on striking the balance of enough, but not too much.

Three ways IoT is transforming inventory management
The connectivity and real-time analytics inherent in the internet of things could be the game changer for retailers’ inventory woes.

The essential guide to supply chain management best practices
Supply chain management best practices include collaboration, strategy and technology. This guide provides essentials on all three.

Top four supply chain strategies to create the omnichannel experience
Transforming your supply chain to deliver an omnichannel experience is key to gaining a competitive edge. Here are four ways to make that happen.

Eight keys to supply chain sustainability
Supply chain sustainability is critical to businesses looking to build a competitive edge and brand image. Here’s some guidance you need to know.

Trending Terms
supply chain management
retail vs. wholesale
replenishment
inventory management
vendor-managed inventory
digital supply chain

Quiz Yourself
__________ management is primarily about specifying the quantity and placement of stocked goods.
a. Inventory
b. Logistics
Answer


September 6, 2017  8:21 PM

on-demand computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud Computing, On-demand computing, SaaS

On-demand computing is a delivery model in which computing resources are made available to the user as needed. Continued…

Quote of the Day

“Cloud computing has shifted the technology model, giving customers on-demand computing services over the Internet…” – Nicole Lewis

Learning Center
Curb on-demand self-service risks with cloud inventory management
Cloud’s on-demand self-service model can lead to shadow IT risks. Fortunately, admins can use cloud inventory management to regain control.

Autonomic computing may pave the way to software-defined data centers
With larger IT shops under increasing pressure to deliver competitive applications and services, many see autonomic computing as a solution.

The true definition of cloud computing is still lost on some IT pros
The true definition of cloud computing, in many cases, has been lost on businesses and even some IT teams. Expert Mark May clears up the confusion.

Cloud BI projects: Partners finding BI work, but not profits
Cloud BI work is growing for channel partners, who find ample consulting opportunities. But they must make do without traditional BI income sources, such as servers and storage.

Which cloud model is best for your big data project?
While public, private and hybrid cloud can all play a role in your big data project, public cloud is emerging as the most popular option. But that doesn’t mean it’s right for you.

Trending Terms
cloud computing
infrastructure as a service
AWS On-Demand Instances
Software as a Service
rogue IT
greynet

Quiz Yourself
Cloud ___________ is the exercise of administrative control over public, private and hybrid clouds.
a. orchestration
b. management
Answer


September 5, 2017  7:58 PM

internet meme

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Leet speak, Viral, Viral marketing

An Internet meme is a cultural artifact that spreads rapidly, reaching a very large digital audience within a short period of time. Continued…

Quote of the Day

“The task of finding out how well companies perform on social media and how much attention they attract is important to a company’s marketing strategy. Many organizations engaged in social media marketing have difficulty measuring performance.” – Nicole Lewis

Learning Center
Social media tools and applications: Channel execs sharpen strategies
Social media tools and applications can help channel partners promote their brands, but companies must carefully devise strategies to get results.

How important are social media backup methods?
Be proactive about your organization’s social media backup, as each social networking site has its own way of storing data.

Your business communication plan should include impact of social media
A business communication plan should contain social media risk analysis. In this social media-centric world, it’s crucial to track employee behavior.

Marketing’s next movement: Social media sentiment analysis tools
AI, BI and big data coupled with social media sentiment analysis tools show potential for marketing automation and next-generation sales.

Social monitoring tool add-ons to measure engagement
Many companies now look for social monitoring tool add-ons to measure audience engagement. Here are a few options.

Trending Terms
viral content
viral marketing
social influencer
viral ad
leet speak
RickRoll

Quiz Yourself
________ marketing is any marketing technique that induces websites or users to pass on a marketing message to other sites or users.
a. Affiliate
b. Viral
Answer


August 31, 2017  7:38 PM

DSC pull server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
DSC, Powershell

A DSC pull server (desired state configuration pull server) is an automation server that allows configurations to be maintained on many servers, computer workstations and devices across a network. Continued…

Quote of the Day

“The DSC push/pull model adds flexibility to environments that require a particular mode to maintain proper configurations.” – Tim Warner

Learning Center
Windows Server 2016 changes prompt a new look at management
Some server admins prefer traditional GUI management, but certain Windows Server 2016 changes steer users toward automation — and the cloud.

Windows PowerShell DSC book trains IT to lock down systems
This Windows PowerShell DSC book explains the fundamentals of the configuration management platform and shows admins how to set it up for their organization.

These Windows configuration management tools can prevent mishaps
Windows configuration management tools can ensure that organizations remain compliant — even if undocumented changes are made to systems.

Getting acquainted with PowerShell Desired State Configuration
PowerShell Desired State Configuration has a few advantages over other systems management tools. Here are some of its benefits.

Learn the basics of PowerShell Desired State Configuration
PowerShell Desired State Configuration is a configuration management feature in Windows PowerShell. Learn the fundamentals and where it can help.

Trending Terms
Microsoft Windows PowerShell DSC
configuration drift
Windows Server 2012
PowerShell
Microsoft Windows Management Framework
Microsoft Windows Server 2016

Quiz Yourself
_________ management allows a system administrator to monitor and manage servers by remote control.
a. LUN
b. lights-out
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: