Word of the Day: Tech Definitions from WhatIs.com


August 28, 2017  3:44 PM

blue/green deployment

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Rolling deployment

A blue/green deployment is a change management strategy for releasing software code. Continued…

Quote of the Day

“Application rollout planning requires IT operations teams to strike a precarious balance between development’s demands, user expectations and the realities of everyday business.” – Stephen J. Bigelow

Learning Center
A deployment pipeline keeps infrastructure ducks in their rows
A scripted deployment pipeline allows infrastructure developers to do more work, in less time and with less effort, to greater success.

Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.

When a new software deployment strategy means continuous adjustment
DevOps means that software constantly updates. To support this software deployment strategy, IT departments need to change and evolve.

ALM best practices for advanced DevOps organizations
This guide on ALM best practices compiles the important considerations for organizations transitioning from Agile to DevOps.

How important is ALM process automation in a modern DevOps approach?
ALM process automation is a crucial part of a modern DevOps approach. Discover techniques and tools for implementing automation in your development phases.

Trending Terms
rolling deployment
A/B testing
phased rollout
uptime and downtime
relational database
software testing
canary test

Quiz Yourself
_________ deployment shortens the time between test and release by automatically pushing out code that has passed automated testing.
a. Rolling
b. Continuous
Answer

August 25, 2017  5:24 PM

cloud orchestrator

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud Computing, Cloud management, Cloud orchestration

A cloud orchestrator is programming that manages the interconnections and interactions among cloud-based and on-premises business units. Continued…

Quote of the Day

“Cloud orchestration directly relates to cloud automation, as it arranges, sequences and coordinates automated tasks.” – David Linthicum

Learning Center
Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.

Advance multicloud management with orchestration, cost optimization tools
To reduce the complexity around multicloud management, admins need to hone their skills around orchestration, automation and cloud cost management.

Cloud orchestration tools become a must-have for hybrid IT
When choosing cloud orchestration tools, consider that some are built to span multiple cloud environments, while others are dedicated to a single platform.

Why orchestration services are important in the DevOps age
Modern organizations are under pressure to produce big results with short deadlines. Orchestration services can help IT to stay on track and thrive.

Learn the benefits of a container orchestration engine in hybrid cloud
A container orchestration engine, such as Kubernetes, allows for more app portability between public and private clouds, but challenges remain.

Trending Terms
TOSCA
cloud computing
hybrid cloud
cloud provisioning
web service orchestration
cloud management

Quiz Yourself
A ________ cloud has a single tenant architecture.
a. public
b. private
Answer


August 24, 2017  6:34 PM

Inbox Zero

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Email management, inbox

Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty — or almost empty — at all times. Continued…

Quote of the Day

“IT professionals seem to have changed their tune, especially as more and more emails flood inboxes and end users try to achieve the holy grail of Inbox Zero.” – Diana Hwang

Learning Center
The Top 5 Disadvantages of Not Implementing an Exception Inbox Zero Policy
How and why should you apply an inbox zero policy when it comes to your exceptions.

Microsoft’s email Clutter tool helps to attain Inbox Zero
IT pros look at Office 365’s email Clutter with a less skeptical eye, noting its ability to personalize end users’ inboxes with only relevant messages based on user behavior.

Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this?

New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?

Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.

Trending Terms
email management
email bankruptcy
time management
email response management service
disappearing email

Quiz Yourself
This is a way for organizations to dictate how email messaging is used in a corporate setting. It also addresses how to secure information that is exchanged via the email system.
A. email governance
B. email management
Answer


August 23, 2017  6:25 PM

H-1B

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
H-1B visas

H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge. Continued…

Quote of the Day

“The H-1B program is a good way of bringing talent into the United States. It gives an opportunity to those from other countries to come to the United States and contribute to the growth of our economy.” – John Moore

Learning Center
Employers pull back on hiring of tech talent for H-1B jobs
Hiring for H-1B jobs in tech is slowed by uncertainty over the visa program for skilled foreign workers, with the administration trying to tighten the program.

Trump’s order on H-1B program puts tech employers on notice
The long-awaited executive order on the H-1B program was issued this week. Take heed, experts said.

Automation vs. the H-1B visa program: Which matters to employees?
The H-1B visa program may face sweeping changes, or even elimination. But industry changes already underway, like automation, may lessen the impact.

Healthcare software developer jobs may be hit by Trump H-1B visa move
EHR vendors could be forced to pay more for healthcare software developer jobs in a Trump plan to reform the H-1B visa program for skilled guest workers.

Citrix CEO talks H-1B visas, other Trump proposals
Citrix CEO Kirill Tatarinov explains why technology companies are on the edge of their seats when it comes to potential changes to immigration and healthcare law.

Trending Terms
SKIL bill
outsourcing
labor arbitrage
human capital management
talent management software
recruiter

Quiz Yourself
This is an integrated set of software applications that human resource management (HR) professionals use to hire and retain employees.
A. talent management software
B. performance management software
Answer


August 22, 2017  8:04 PM

industrial control system (ICS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Operational technology, SCADA, Targeted Attacks

Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued…

Quote of the Day

“Today, it is commonplace to find engineering workstations and servers on the ICS networks using Windows operating systems. These systems are susceptible to WannaCry and other attacks on the Wintel operating systems.” – Ernie Hayden

Learning Center
How does CrashOverride malware threaten industrial control systems?
CrashOverride malware shut down parts of Ukraine’s power grid, and it could threaten other industrial control systems. Here’s what to do about it.

Industroyer malware a turning point for ICS security
Security researchers at Black Hat 2017 tackle the Industroyer malware and the threats to energy grids and ICS security.

How WannaCry malware affects enterprises’ ICS networks
WannaCry malware can be a problem for enterprises’ ICS networks. Here’s a look at why, and what can be done to protect ICS from the ransomware.

A look at the development of an ICS security framework
The ICS security framework development was influenced by other cybersecurity frameworks. Expert Ernie Hayden gives an inside look to the industrial control systems process.

Industrial control systems a growing target for cyber attack
Attackers with increasing capabilities have strong financial motivation to go after critical infrastructure and manufacturing firms, says security industry expert.

Trending Terms
SCADA
ICS security
operational technology
programmed logic controller
IT/OT convergence
targeted attack
air gapping

Quiz Yourself
This category of hardware and software monitors and controls how physical devices perform.
a. operational technology (OT)
b. information technology (IT)
Answer


August 21, 2017  7:49 PM

Eclipse

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Eclipse, Java, Open source

Eclipse is a free, Java-based development platform known for its plug-ins that allow developers to develop and test code written in other programming languages. Eclipse is released under terms of the Eclipse Public License. Continued…

Quote of the Day

“Open source is becoming more accessible because enterprises have seen a number of their peers use it and the sky didn’t fall in.” – Van Lindberg

Learning Center
Oracle opens Java EE, any takers?
The IT industry is discussing where EE might find its next home and bets are split between the Linux Foundation, the Apache Foundation or the Eclipse Foundation.

How to choose cross-platform app development tools
Cross-platform app development tools provide the ability to create apps that can be delivered quickly to many platforms. Learn how this approach can benefit your company.

Open source philosophy goes well beyond software — and into our lives
The open source philosophy is spreading beyond the world of software. Open source advocates at the 2017 Red Hat Summit explained how.

The future of Java promises a cleaner, more readable syntax
Is Java too verbose? Many tend to think so, which is why Oracle’s Java architects are helping to make the syntax of Java more concise in the future.

Open source no longer scares the enterprise
Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door.

Trending Terms
open source
integrated development environment
Java
Apache
Visual Studio Express
Java EE

Quiz Yourself
This fundamental component of a computer program can be read and easily understood by a human being.
a. source code
b. object code
Answer


August 18, 2017  6:24 PM

Microsoft Windows Defender

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Antimalware, Windows Defender

Windows Defender is Microsoft’s antimalware software. Defender works with Windows Update to automatically install new virus definition files as they are published and provide computers using the Microsoft operating system (OS) with both real-time and anytime scanning options. Continued…

Quote of the Day

“Regardless of whether you use Windows Defender or something else, having antimalware tools in place isn’t enough. You must make sure your defenses actually work.” – Brien Posey

Learning Center
Microsoft antivirus policy changes under Kaspersky pressure
Microsoft antivirus policy changes for Windows 10 Fall Creators Update to get Kaspersky to drop an European antitrust case.

Windows Defender bug could allow full-system takeover
Google’s Project Zero found another dangerous, remotely exploitable Windows Defender bug that Microsoft rushed to patch. Here’s what you need to know about it.

How to create an ideal Windows 10 security setup
To create an effective Windows 10 security setup, IT admins have to look at encryption, password complexity, data loss prevention and more.

Apparent Win10 Defender Update Issues Illusory
Recent cumulative updates have led to reports of Windows Defender update errors. Fortunately, these apparent Win10 Defender Update issues are illusory.

Protect against malware Microsoft Windows Defender
Microsoft Windows Defender, installed by default in Windows Server 2016, protects against known malware, a step towards automatic Windows Server hardening.

Trending Terms
anti-spyware software
antimalware
Microsoft Security Essentials
ransomware
Trojan horse
Microsoft Windows Server Antimalware

Quiz Yourself
This is a malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks.
a. ransomware
b. Trojan horse
Answer


August 17, 2017  7:17 PM

CAPTCHA

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
image captcha

A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic software programs. Continued…

Quote of the Day

“CAPTCHA challenge tests include image and text challenges, as well as an audio test option to ensure that users with visual impairments can respond.” – Michael Cobb

Learning Center
How can Google’s CAPTCHA challenge be bypassed using Google tools?
Researchers managed to bypass Google’s CAPTCHA challenge by exploiting flaws in Google web-based tools. Find out what flaws enable this attack.

Identifying and addressing overlooked web security vulnerabilities
Critical web security vulnerabilities can be resolved with proper tools, scanning and tests. Find out how to identify the top overlooked issues.

Machine versus the bots: Does your website pass the Turing 2.0 test?
Robert Richardson questions whether computers can detect the bots vs. real users, as security tools use browser behavior and polymorphism to protect against data theft and fraud.

Bot versus bot – AI: A brief history of man versus machine intelligence
We are making great strides in enabling computers to perceive things. We can now build amazing applications that can mimic humans

CAPTCHA-bypassing malware on Android apps found in Google Play Store
Researchers found sophisticated CAPTCHA-bypassing malware on Android apps in the official Google Play Store.

Trending Terms
challenge-response system
Turing Test
image recognition
software robot
alphanumeric
graphical password

Quiz Yourself
A __________ is a list of domain names from which an e-mail blocking program will allow messages to be received.
a. blacklist
b. whitelist
Answer


August 14, 2017  6:18 PM

superposition

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Quantum theory

Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured. Continued…

Quote of the Day

“Full-blown quantum computing systems won’t be operational for several years, but opening it up to corporate developers will get IT shops thinking about what the technology can do.” – Dave Turek

Learning Center
Can IBM fast-track quantum computing via the crowd?
IBM hails its new cloud-enabled quantum computing service as the birth of the quantum age of computing. Also in Searchlight: Facebook rewards 10-year-old for ethical hacking.

Atos targets universities and research centres with quantum computing simulator
Atos has made a quantum computing simulator available for sale so that organisations can test out the algorithms of the future.

IBM Quantum Computing project: reaching a super position on superposition
A universal quantum computer uses quantum mechanics to process massive amounts of data and perform computations in powerful new ways not possible with today’s conventional computers.

D-Wave builds open quantum computing software development ecosystem
D-Wave Systems has released an open source quantum computing chunk of software.

One quantum leap for IBM, one small step for IT
Big Blue has served up an appetizer of its quantum computing efforts, to give the IT world its first taste of what possibilities the emerging technology might offer.

Trending Terms
quantum theory
Schrodinger’s cat
quantum computing
entanglement
quantum interference
double-slit experiment
qubit

Writing for Business
Wave-particle duality is a fundamental __________ of quantum theory.
a. principle
b. principal
Answer


August 11, 2017  5:34 PM

CompTIA

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
CompTIA

CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses. Continued…

Quote of the Day

“Private equity firms and other people are more likely to provide capital today to companies that have good diversity numbers.” – Todd Thibodeaux, CompTIA CEO

Learning Center
CompTIA: How to tap into the benefits of diversity
CompTIA took channel executives to task for the lack of diversity in the tech industry, stating the benefits of diversity were too large to ignore.

What are the best ways to prep for CompTIA exams?
CompTIA exams can stump IT pros without the right preparation, practice and patience. Follow these tips to pass the test, and plan your certification path.

CompTIA AITP to support IT pros along their ‘resume-to-retirement’ journey
CompTIA is launching its first IT professional organization — CompTIA AITP — this spring. CompTIA has acquired AITP as part of the initiative.

Vendor-neutral certification guide for infosec professionals
Expert Ed Tittel offers a vendor-neutral certification primer for infosec professionals seeking to boost their career paths.

IT industry certifications boost morale, grow partner revenue
IT industry certifications can help prospective employees stand out from the crowd and enable channel partners to create a positive work environment.

Trending Terms
CompTIA practice test
A+
CompTIA Cloud Essentials
system administrator
data center administrator
ISC2

Writing for Business
Certifications and degrees are great, but you need to have excellent communication skills to be successful in your IT career change. This includes being able to write _____.
a. well
b. good
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: