“Right: Create a title that makes the reader want to read your content. And make sure the content provides what the reader expects from your title.
Wrong: Create a title that makes the reader want to read your content. And then provide some content that may have some slight connection to the title.” — Ivy Wigmore
Today’s WhatIs.com Word of the Day is linkbaiting, the practice of luring readers to online content in hopes of a click or even better, an inbound link. Did you know that there are tools out there to help you with your linkbaiting? The really cool part is that the linkbait generator is (surprise) great linkbait. (It’s kind of like looking at a picture of a mirror inside a picture of a mirror inside a picture of a mirror!)
“A good example of where risk-based authentication is extensively used today is on banking websites. After a customer registers for access to his or her account, if he checks the account from a remote location not previously used to access the account or uses a system never used before, the risk-based authentication system recognizes this fact. ” — Randall Gamby
Today’s WhatIs.com Word of the Day is risk-based authentication, applying more rigorous standards for granting access when there is an indication that someone might not be who he says he is. You may have experienced risk-based authentication if you’ve ever accessed your bank account from another country and were asked more than the usual number of security questions. Common criteria for assessing risk includes geographic location, IP address and the status of antivirus software.
“The Open Networking Foundation, the nonprofit organization that promotes OpenFlow, is a who’s-who of networking and infrastructure heavyweights: Facebook, Google, Microsoft, Yahoo, Cisco Systems, Juniper Networks, HP, Citrix Systems, Dell, IBM, NEC and VMware.” — Lisa Sampson
“Only with a Chief Experience Officer at the top of the organization can you assure that experience becomes and stays a top priority, is enterprise consistent and tied to the hip with marketing. After all, word of mouth is your most important marketing tool and word of mouth is nothing more than offering great experiences that people talk about.” — Anthony Cirillo
Today’s WhatIs.com Word of the Day is Chief Experience Officer (CXO). It’s a new job title, replacing Chief Customer Officer in retail and entertainment industries and Chief Activity Officer in healthcare and travel.
“I was lucky enough to be in the audience yesterday for the introduction of Salesforce’s new product, Marketing Cloud. Based on the demo, I believe Marketing Cloud has just taken the top spot among Social Media Management Software (SMMS) companies like Sprinklr and Expion.” — Shel Holtz
Today’s WhatIs.com Word of the Day is social media management software (SMMS), a genre of software tools that will help you manage your social media presence.
“The Bonjour gateway might not be able to replace mobile device management systems, but it does allow for granular control over how devices connect and where they have access.” — Gina Narcisi
Today’s WhatIs.com Word of the Day is Apple Bonjour. It’s a handy little program that lets Windows and Apple devices share the same printers. Home network users have been fans of Bonjour for many years.
Bonjour was only designed to locate Apple devices within the same network, however, so network admins whose employees want to print from their iPads and iPhones or access file servers can use Aerohive’s Bonjour Gateway. It’s a free VMware virtual appliance that allows Bonjour to operate across networks on different subnets or virtual LANs. Cisco recently announced that it would turn its WLAN controllers into a Bonjour gateway and provide policy-based management capabilities. Expect other networking vendors to follow.
“Spammers create as many as 40 percent of the accounts on social-media sites. About 8 percent of messages sent via social pages are spam, approximately twice the volume of six months ago.” — Mark Risher
Today’s WhatIs.com Word of the Day is likejacking. That’s right folks, email spam isn’t as effective as it used to be — so the spammers have moved on to greener ($$) pastures.
“Companies talk about adopting internal social tools, but shy away from introducing them because of a fear of change and what they could do to longstanding practices.” — Alan Lepofsky
Today’s WhatIs.com Word of the Day is social task management, a real-time, collaborative software-based approach to business activities. Social task management is basically ye olde to-do list, plugged in so it’s transparent and everyone can see it. The idea is that everyone knows what everyone else is working on (much like how daily scrums work) so (1) everyone knows how their little part fits into the big picture and (2) anyone who happens to have skills that could help someone else can offer to help out.
“If you look at all the companies involved in the OpenStack community, those are some big technology players and they’re all going to be looking for OpenStack talent.” — Tony Campbell
Today’s WhatIs.com Word of the Day is OpenStack, an open source platform-as-a-service (PaaS) initiative for creating and managing large groups of virtual private servers in a cloud computing environment. OpenStack was set up to compete with Amazon and is often referred to as the “Linux of the cloud.” In September, the OpenStack foundation formally took over development and approved VMware as a member. That was when the you-know-what hit the fan and bloggers began speculating what VMware was up to and whether their admittance to the party spelled doom for the OpenStack initiative.
“Although some security experts question whether multifactor authentication actually increases security — they say it isn’t perfect and can be cracked just like any other authentication system — it does add an extra layer of security for identity and access management (IAM) suites.” — Joel Dubin
Today’s WhatIs.com Word of the Day is multifactor authentication. There are three ways to authenticate an end user — by what they know (password), by what they have (smart card) and by who they are (biometric verification). Multifactor authentication requires that at least two out of three methods be used.