Word of the Day: Tech Definitions from WhatIs.com

March 22, 2017  8:13 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Work-life balance", Millennials

Adulting is the assumption of tasks, responsibilities and behaviors traditionally associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult and that acting as one does not come naturally. Continued…

Quote of the Day

“The primary drivers for every previous generation were money and status. For Millennials, it tends to be more relationships and experiences — that’s how they keep score.” – Scott Degraffenreid

Learning Center
Retaining Millennial employees: What you need to know
Are you committed to retaining your Millennial employees? Learn about the characteristics of Millennials and how CIOs can keep them happy and productive.

Rehab or Reject Problem Employees: When Technical Skills Aren’t Enough
CIOs have to deal with troublesome employees from time to time. Learn how to face the problem.

DevOps done right: Why work-life balance matters to digital transformation success
The DevOps practitioners warn enterprises about neglecting the health and well-being of the IT staff responsible for delivering their digital transformation projects.

Forget flex spending, Millennials want a flexible mobile device policy
Millennials are willing to pass over the almighty dollar for a flexible mobile device policy, but is IT ready to adjust to a bring-your-own-device world?

CompTIA recognizes millennials with new community group
CompTIA has announced the CompTIA Future Leaders, a new community targeting the millennial generation in the channel. Future Leaders is the tenth CompTIA community.

Trending Terms
job hopper
work-life balance
Results-Only Work Environment

Writing for Business
BYOD policies often illustrate a significant ________ between administrators and employees.
A. disconnect
B. disconnection

March 21, 2017  2:21 PM

programmatic advertising

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Marketing and Advertising"

Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps. Continued…

Quote of the Day

“Marketing and advertising are the sweet spots for big data, but those who serve up marketing insights and ad space will need to evolve to survive.” – Jack Vaughan

Learning Center
Marketing and advertising remain sweet spots for big data technology
Marketing and advertising are the sweet spots for big data, but those who serve them up will need to evolve to survive. Learn more about how marketers and advertisers use big data.

Technology advertisements that cross ethical, legal lines
With technology advertisements, it’s hard to tell fact from fiction, says technology and security consultant Kevin McDonald. Irresponsible claims may put lives at risk.

Open Your Marketing Mind to Context and Quality
This blog post warns marketers about perils of low-cost CPMs associated with programmatic advertising and lays out better ways to target audience through context.

Before You Leap, Understand the 4 Pillars of Intent-Based Marketing
This blog post addresses the landscape, challenges and solutions in the B2B IT intent data market and lays out 4 building blocks for intent-based marketing success.

Advertising terminology on the internet
This page provides brief definitions for the most commonly-used terms related to internet advertising, along with links to full definitions for many of the terms.

Trending Terms
real-time bidding
ad exchange
targeted ad
purchase intent
ad fraud
demand-side platform

Writing for Business
Optimizing an ad campaign once it’s been set up is incredibly important and is often something advertisers ________.
A. look over
B. overlook

March 20, 2017  8:17 PM

holistic security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Attack surface, iot security, Network security

Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system. The ultimate purpose of holistic security is continuous protection across all attack surfaces: the totality of all physical, software, network and human exposure. Continued…

Quote of the Day

“There are far too many technologies built to different standards and specifications by multiple vendors, making it impractical for one company to provide a holistic security solution alone.” – Sanjay Khatri

Learning Center
Holistic security for database-centric applications
In this exclusive video presentation, Nemertes Research Senior Vice President and Founding Partner Andreas Antonopoulos provides an executive overview of the security issues of securing database-centric applications and the key tactics essential to success.

What do we need to make IoT security a reality?
Security models for PCs and smartphones are not applicable to the Internet of Things, according to IoT security researcher Angela Orebaugh.

Holistic fraud reduction through customer security management
A holistic approach to fraud reduction by focusing on customer behavior across multiple channels would help banks fight fraud. Fraud reduction requires a holistic approach lacking in today’s fraud detection technology.

Prevent enterprise IoT security challenges with preparation
Knowing the risks of the Internet of Things and taking the proper precautions are critical to preventing enterprise IoT security challenges down the line.

IoT World reveals the Wild West of IoT standards
While many industry insiders are advocating interoperability among Internet of Things standards, the market is still fragmented and vertical-specific.

Trending Terms
attack surface
systems thinking
IoT security
risk intelligence

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
A. flouting
B. flaunting

March 17, 2017  6:50 PM

Hawthorne effect

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Employee monitoring

The Hawthorne effect is a psychological phenomenon that produces an improvement in human behavior or performance as a result of increased attention from superiors, clients or colleagues. Continued…

Quote of the Day

“Just remember that you need to find a balance between ethics, best practices in monitoring and keeping your employees happy and productive.” – Gary Miliefsky

Learning Center
Best practices for employer monitoring of social media
Employer monitoring of social media should be covered in a social media policy for employees, explains IT security expert Joe Granneman in this security advice column.

IoT at work: How IoT empowers employee productivity
Deploying IoT in the workplace can improve employee productivity and employee satisfaction — a win for both management and the company as a whole.

Firms can monitor employees’ online chats, EU court rules
Human rights court says it is not unreasonable for employers to want to verify that staff are completing their professional tasks during working hours.

Employee monitoring: Is Big Brother a bad idea?
Employee monitoring can help protect intellectual property and keep an eye on employee activities, if it’s done properly. In this interview, expert Kevin Beaver of Principle Logic LLC talks about the dos and don’ts of employee monitoring.

Spyware vs. spyware: Employer and employee monitoring
What rights and responsibilities do employers and employees have when monitoring others’ use of company systems?

Trending Terms
social networking
employee productivity
human resource management
employee monitoring

Writing for Business
Business activity monitoring provides an immediate real-time monitoring and _________ capability.
A. decisioning
B. decision-making

March 16, 2017  5:30 PM

critical thinking

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Bias, innovation

Critical thinking is the capacity to be objective, rational and analytical about subjects, situations and cognitive problems. As a process, critical thinking is the ongoing effort to improve our cognitive abilities in that capacity. Continued…

Quote of the Day

“By applying appropriate types of thinking at critical junctures, IT professionals will make better decisions, perhaps putting the number of failed projects on the decline in future.” – Joseph R. Czarnecki

Learning Center
The importance of critical thinking in software testing
Whether you are using automated testing, exploratory testing or any other testing approach, it is important to use critical thinking skills.

Top skills for IT managers – Part 3: Critical Thinking and Problem Solving
In this six-part series, Joseph R. Czarnecki, project management specialist and senior consultant at ESI International, identifies six top business skills at which every IT project manager needs to excel.

Common biases that can taint analytics analysis
Businesses are increasingly using data to drive decisions, but these common biases can still muddle analytics analysis.

Software testing techniques: Overcoming biases
Expert Gerie Owen offers software testing techniques to help overcome biases and boost code quality and answers the pressing question: “How did I miss that bug?”

Think different: Cognitive computing systems will bring data-led change
Cognitive computing systems will replace old programming models and devise applications based on data.

Trending Terms
six thinking hats retrospective
PMI retrospective
availability bias
business innovation

Writing for Business
Critical thinking asks if a conclusion is ______ evidence or gut feelings.
A. based on
B. based off

March 15, 2017  4:33 PM

rogue employee

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Rogue IT, Shadow IT

A rogue employee is a worker who undermines the organization that employs him by failing to comply with its business rules and policies. Continued…

Quote of the Day

“The ultimate threat remains one that most IT managers choose not to even think about: the rogue employee or contractor who compromises security either inadvertently or intentionally.” – Craig Mathias

Learning Center
Rogue activity thwarted by early warning systems
Learn how to frustrate rogue employees at financial services firms.

Protect your network and data from internal threats
Internal threats can pose just as much of a problem as external threats, so it’s important to remember to account for vulnerabilities in both avenues of attack.

Cybercriminals, rogue users cause DaaS security concerns
DaaS security concerns such as hackers from competing companies, disgruntled inside employees and users with unsecure browsing habits can all put your hosted desktops at risk.

Defend against internal network threats
Security software helps protect your network from the outside world, but what if the threat is internal — a rogue employee, for instance. Defend against internal network threats with this tip.

Building staff-related disaster scenarios for BC/DR exercise planning
Develop effective staff-related business continuity and disaster recovery scenarios in your BC/DR exercise planning by focusing on the sudden loss of more than one key person.

Trending Terms
business continuance
insider threat
rogue IT
industrial espionage
shadow IT

Writing for Business
Most major security breaches ____________ human error.
A. can be attributed to
B. are due to

March 14, 2017  4:24 PM

six degrees of separation

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Six degrees of separation is the theory that any person on the planet can be connected to any other person on the planet through a chain of acquaintances that has no more than five intermediaries. Continued…

Quote of the Day

“If you have ever drawn dots on a whiteboard and then connected them, you can appreciate that thinking in terms of nodes and links naturally echoes many real-world scenarios.” – Mike Matchett

Learning Center
Set strategy to target social media influencers
Learn best practices to determine social media influencers.

Why Facebook and the NSA love graph databases
Graph databases help us understand important relationships between data points rather than compartmentalizing them. See how IT teams are implementing this approach for businesses.

Six degrees of sales separation
New social-networking applications designed to close deals are based on the premise that every salesperson has a Kevin Bacon or two in their lives, but just need help finding them.

Graph database technology starts to come of age beyond social media
Graph databases, based on mathematics known for three centuries, are starting to yield value for businesses beyond Facebook and Twitter.

Graph databases: Joining the dots
We explore why the growth of graph databases could be pointing the database market in a new direction.

Trending Terms
graph database
graph theory
social networking
social graph

Writing for Business
Some people join social networking sites but don’t ________ them often.
A. frequent
B. visit

March 13, 2017  7:50 PM

demand-side platform (DSP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Marketing and Advertising", advertising, Real-time data

A demand-side platform (DSP) is software that allows an advertiser to buy inventory from ad exchanges and manage advertising campaigns. Continued…

Quote of the Day

“Advertising has always been about data. Even when you go back to the ’60s and the sponsoring of TV shows, it was always about finding an audience.” – Richard Sobel

Learning Center
Sky’s the limit for cloud big data in online ads
An online marketing and advertising company finds that using a cloud big data platform is more economical and better for the work it does.

Marketing and advertising remain sweet spots for big data technology
Marketing and advertising are the sweet spots for big data, but those who serve them up will need to evolve to survive. Learn more about how marketers and advertisers use big data.

Don’t Fall Prey to the Perils of Lowest-Possible CPMs
This bog post warns marketers about perils of low-cost CPMs associated with programmatic advertising and lays out better ways to target audience through context.

CIOs under pressure to generate revenue through data monetization
Companies are increasingly venturing into the data monetization business, putting added pressure on CIOs.

3 Questions to Ask Before Starting a Retargeting Campaign
This post outlines 3 questions technology marketers should ask before launching a retargeting campaign and why you must pay more attention to data sources.

Trending Terms
ad exchange
real-time analytics
real-time bidding
supply-side platform
targeted ad
programmatic advertising

Writing for Business
________ allow an advertiser to maximize their ROI through exceptional targeting, real-time bidding, and campaign optimization.
B. DSP’s

March 10, 2017  8:05 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Ephemeral messaging, Snapchat

Snapchat is a mobile app that allows users to send and receive “self-destructing” photos and videos. Photos and videos taken with the app are called snaps. Continued…

Quote of the Day

“The company formerly known as Snapchat has been rebranded as Snap, Inc., and is entering the hardware market with the release of image-capturing sunglasses called ‘Spectacles.'” – Christian Stafford

Learning Center
Snapchat eyes the hardware market with new video-recording sunglasses
Snap, Inc., the company behind the popular photo and video messaging app Snapchat, is releasing a pair of photo and video-capturing glasses that have some worried about the possible privacy implications of such a device.

CES to CIOs: Watch out for wearable technology
This week’s Searchlight finds wearable technology looking and working better than ever. Plus, a tough lesson in how not to use email, the lure of ephemeral messaging and more.

Snapchat hack has users thinking twice
A recent hack into Snapchat, the social media platform for photo sharing, has users thinking twice about giving personal information to these services.

Twitter savvy health IT exec uses wearable tracking device
Twitter savvy healthcare system chief innovation officer uses smart wearable tracking device for fitness and sees wearables as important to health IT.

Book chapter: Social media security policy best practices
The following is an excerpt from chapter 6 Gary Bahadur from the book “Securing the clicks: Network security in the age of social media.”

Trending Terms
ephemeral messaging
show-me marketing
wearables OS
systems of engagement

Writing for BusinessI’m cleaning up my Facebook account, unfriending people I don’t know and the ones I wish I didn’t know that have somehow ______ in.
a. snuck
b. sneaked

March 9, 2017  3:02 PM

vulnerability management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
vulnerabilities, vulnerability management

Vulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design could compromise the security of an endpoint or network. Continued…

Quote of the Day

“Organizations tackle the most severe vulnerabilities first and work their way down to the least severe as time and resources permit. Some vulnerabilities don’t pose a serious threat to the organization and may simply be accepted, which means they are not remediated.” – Ed Tittel

Learning Center
Introduction to vulnerability management tools
Vulnerability management tools can be an invaluable asset for enterprises. Here’s how vulnerability management software works to close security gaps.

Comparing the top vulnerability management tools
Expert Ed Tittel explores and discusses critical features of the top vulnerability management tools on the market.

Pentagon hack possible due to bad vulnerability management
A Pentagon hack may have already occurred because of flaws in DOD systems that have been unpatched for at least eight months.

Seven criteria for buying vulnerability management tools
Expert contributor Ed Tittel describes key purchasing criteria for vulnerability management tools for all types and sizes of organizations.

Best practices for an information security assessment
An information security assessment is a good way to measure the security risk present in your organization. Find out how to yield effective results.

Trending Terms
vulnerability management planning
vulnerability analysis
Common Vulnerability Scoring System
penetration testing
vulnerability scanner
vulnerability disclosure
hardware vulnerability
zero-day vulnerability

Writing for Business
The number of security holes found during the penetration test left _________ shaken.
A. the CSO and me
B. the CSO and I
C. the CSO and myself

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: