|While BPO places an emphasis on low level processes, KPO places an emphasis on high level processes such as patent filing, investment research and legal issues.|
Today’s WhatIs.com Word of the Day is knowledge process outsourcing (KPO). By 2010, the KPO industry is projected to generate $17 billion globally. About 70% of the business will go to knowledge workers in India.
The WhatIs.com Word of the Day is cloud backup.
|“Technically, archiving applications used for compliance should apply policies to files, move files based on those policies and keep audit information on files. Also, the file content should be indexed to make it searchable and be written to specific media depending on regulatory specifics.”
Shane O’Neill, Choosing a compliance archiving tool
Today’s WhatIs.com Word of the Day is data archiving.
|On the surface, Appreciative Inquiry can sound too “touchy feely” for hard-nosed business people. We like to vent and to gripe. But is venting the best use of time at an organization’s planning meeting?
Jane Logan Appreciative Inquiry
Today’s WhatIs.com Word of the Day is Appreciative Inquiry.
|Near CDP is a marketing invention of people who don’t offer continuous data protection but are trying to repackage non-continuous technologies as ‘kind of being the same thing.’
Mark Twomey, Non-CDP
Today’s WhatIs.com Word of the Day is near-continuous data protection.
|Up until now, hot desking has been hard to sell — especially in the banks. But now it is pretty attractive compared to a cold desk in the street.
David Crosbie, Sell your CIO on helpful technologies
Today’s WhatIs.com Word of the Day is hot desking.
|Chrome OS is only shipping on specific hardware from manufacturers Google has partnered with. That means if you want Chrome OS, you’ll have to purchase a Chrome OS device.
Sundar Pichai, Google OS: the end of the hard drive?
Today’s WhatIs.com Word of the Day is Google Chrome OS.
|Even the most widely used protocol on the Internet — namely, HTTP — may be described as both chatty (involving frequent communications) and bursty (involving numerous periods during which tens to hundreds of resource requests may be in flight on the network at any given moment).
Ed Tittel, WAN optimization techniques
Today’s WhatIs.com Word of the Day is chatty protocol.
Today’s WhatIs.com Word of the Day is WAN accelerator.
|We describe this type of attack as “active” rather than “passive” because of two essential differences in the nature of the attack:
• It is initiated by the attacker rather than the victim
• The target is entirely controlled by the attacker, rather than being limited by the extent of the victim’s browsing activity
Roi Saltzman and Adi Sharabani, Active Man in the Middle Attacks whitepaper