Word of the Day Archive

September 12, 2016  8:10 PM

columnar database

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

A columnar database is a database management system (DBMS) that stores data in columns instead of rows. Continued…

Quote of the Day

“Columnar database technology lets you go deeper in big data analytics, speeds up enterprise reporting and cuts down on the number of administrators needed for storage.” – Wayne Kernochan

Learning Center
A look inside the SAP IQ column-oriented database
The SAP IQ 16 column-oriented database can be used to deploy decision support, business intelligence, data warehouse and data mart implementation.

Why columnar database technology should matter to IT
A columnar database handles data differently than a relational database and can improve big data and enterprise applications. Here’s how it works and how the vendor offerings differ.

What’s available in columnar databases
Appliances for columnar databases compete with — and sometimes work alongside — relational database offerings in various ways. We take a look at the four main vendors for columnar databases.

GPU database serves up analysis of tweets, other data feeds
A Harvard and MIT researcher found benefits in use of a GPU database over techniques such as Hadoop for analytics on massive numbers of social tweets.

How to justify the purchase of a data integration tool
With big data everywhere, data integration is more vital than ever. Explore how a data integration tool can help address your enterprise’s needs.

Related Terms
database management system
in-memory analytics

Related Tags
DBMS architecture design and strategy
Data warehouse software

September 9, 2016  6:44 PM

recommendation engine

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data Science, Machine learning, Predictive Analytics

A recommendation engine, also known as a recommender system, is software that analyzes available data to suggest something that an end user might be interested in such as a website, a book, an article of clothing, a video or a job. Continued…

Quote of the Day

“What’s coming down from larger-scale data that we want to induce things from is using machine learning with recommendation engines to say ‘You may not have known it, but based on the patterns we see, here’s what you need to look into.'” – Ritika Gunnar

Learning Center

Data science industry eyes machine learning, recommendation engines
The data science industry isn’t waiting for you. Developers, it’s time to get educated on machine learning and recommendation engines or get left behind.

Semi-structured data is king of LinkedIn’s recommendation engine
LinkedIn’s semi-structured data shines, CVS responds to social media finger wagging, and Microsoft does the shuffle, The Data Mill reports.

Online music startup picks a recommendation engine
Neil Young’s PonoMusic opted for Datameer platform software to field a site recommendation engine. The goal: Give users the feel of a vinyl store of yore

Data scientists benefit when they pay attention to tools for big data
Data scientists may not like spending time on tools for big data, but doing so can pay off in better analyses and more time to do real data science.

Fashion tech startups use data science to build virtual dressing rooms
Fashion tech startups Virtusize, Clothes Horse and LoveThatFit are solving online fashion’s fit problem.

Related Terms

predictive analytics
machine learning
predictive modeling

Related Tags

Enterprise data architecture best practices
Enterprise business intelligence software

September 8, 2016  8:14 PM

overlay network

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Networking, SDN, Virtualization

An overlay network is a telecommunications network that is built on top of another network and is supported by its infrastructure. Continued…

Quote of the Day

“Overlay networks create virtual network containers that are logically isolated from one another even though they share the same underlying physical network.” – Lee Doyle

Learning Center

LAN SDN management looks to the cloud and causes LAN ghost towns
As campus LANs move from on premises to the cloud, they’ll need automated LAN SDN management, which will create new network manager opportunities.

Overlay networks: Understanding the basics, making it a reality
Network overlays place a virtual network over the physical infrastructure for dynamic provisioning and orchestration of network resources.

Is fabric necessary for network virtualization overlay?
A network virtualization overlay can work just fine without a fabric underpinning, according to a network expert.

Network virtualization now, and the overlay network future
In part 1, expert Jim Metzler examines network virtualization (NV), including traditional approaches and emerging developments like overlay networks.

Overlay networks could revolutionize ISP backbone
Overlay networks aren’t just for the data center. ISPs can’t ignore the reduced Opex and increased agility that network overlays could bring to backbone networks.

Related Terms

SDN overlay
virtual private network
content delivery network

Related Tags

Network overlay software
SDN network virtualization

September 7, 2016  6:25 PM

leet speak

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hacking, Programming, Security

Leet speak, also known as hackspeak or simply leet, is the substitution of a word’s letters with numbers and/or special characters. Continued…

Quote of the Day

“I take a word and use ‘hacker speak’ to substitute numbers or special characters in place of some letters. That way I can still remember the password, and it won’t be cracked by a simple dictionary attack or easy guess. For instance, instead of using ‘october,’ change it to ‘oct0b3r.'” – Tony Bradley

Required Reading

How effective are password hack tools?
Learn how password hack tools are being used in combination with Nvidia Graphics card and rainbow tables to crack WPA and Wi-Fi credentials. Make sure to create a strong password, even with the Leet alphabet.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

Expert how-tos: Creating strong passwords
In this tip, five Windows-security experts respond to the question, “How do you create strong passwords?”

Business security begins with a strong password policy
A sound password policy alone won’t guarantee your company’s security, but you have little chance without one.

How to build complex passwords and avoid easy breaches
Password problems are leading to easy data breaches like the recent celebrity iCloud hack. Expert Keith Palmgren discusses how to build unpredictable and complex passwords.

Related Terms

strong password
dictionary attack
private key

Related Tags

User passwords and network permissions
Hacker tools and techniques, underground sites and hacking groups

July 30, 2014  1:58 PM

Explaining SMAC (social, mobile, analytics and cloud)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

WhatIs.com Word of the Day

SMAC (social, mobile, analytics and cloud) is the concept that four technologies are currently driving business innovation. SMAC creates an ecosystem that allows a business to improve its operations and get closer to the customer with minimal overhead and maximum reach. None of the four technologies can be an afterthought because it’s the synergy created by social, mobile, analytics and cloud working together that creates a competitive advantage.

Quote of the Day

“Social, mobile, analytics and cloud technologies (SMAC) are the front runners in disruptive technologies driving business innovation…” – Karl Flinders

Related Terms

1:1 marketing
customer analytics
mobile location analytics
Nexus of Forces
loyalty card program
social media analytics
cloud analytics
social login
disruptive technology
data broker

Related Tags

Customer privacy and data security
Commerce technology and strategy

Required Reading

From smoke signals to SMAC, digital business arrives
Harvey Koeppel analyzes how social media, mobile, analytics and cloud technology has transformed business communications. It’s time for CIOs to get their SMAC on.

Talking SMAC with Dell CIO Andi Karaboutis
Dell CIO Andi Karaboutis talks about the demand for SMAC and self-service analytics.

CIO Interview: Lance Fisher, CIO, SThree
Learn why sThree CIO Lance Fisher’s IT strategy revolves around around SMAC.

A guide for CIOs: SMAC strategy and governance
Read this Essential Guide to learn how SMAC technologies are changing the way businesses run. Explore the benefits of a SMAC strategy and find expert tips on SMAC governance best practices.

July 28, 2014  1:57 PM

hardware-as-a-service (HaaS)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day

Hardware-as-a-service (HaaS) is a procurement model that is similar to leasing or licensing. In the hardware-as-a-service model, hardware that belongs to a managed service provider (MSP) is installed at a cutomer’s site and a service level agreement (SLA) defines the responsibilities of both parties.

Quote of the Day

“Vendors as well as distributors and independent finance companies are being forced to be more dynamic with their offerings as customers grow fond of paying for IT solutions on a monthly recurring payment model as an operating expense, with little interest in owning anything.” – Lynn Haber

Related Terms

customer premises equipment
managed service provider (MSP)
managed IT service
infrastructure-as-a-service (IaaS)
managed hosting

Related Tags

MSP Business Model

Required Reading

Plantronics’ new hardware as a service UC devices complement UCaaS
Plantronics is offering a hardware as a service program which will bundle the costs of UC devices with UCaaS offerings.

Server refresh options: When to rent a server vs. when to buy
Companies should look at financing options when deciding whether to rent a server or buy a server.

Should you lease or buy network equipment?
You might not think twice about leasing a car or renting an apartment, but what about your switches and routers?

July 25, 2014  3:18 PM

Word of the Day: cloud storage gateway

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day

A cloud storage gateway is a stand-alone computing device or a virtual machine (VM) located on the customer premises that serves as a bridge between local applications and remote cloud-based storage.  As the market has evolved, some vendors have dropped the word “gateway” in favor of the word “controller” to emphasize the idea that their gateway products do more than just translate protocols and serve as a bridge.

Quote of the Day

“Call them cloud controllers, cloud storage enablement or maybe cloud-integrated storage. Just don’t call them cloud storage gateways, at least not when you’re talking to any of the vendors who sell these intelligent cloud storage systems.” – Ellen O’Brien

Related Terms

cloud storage
tiered storage
cloud provider API
public cloud storage
private cloud storage
open source cloud storage
cloud storage SLA
Hybrid cloud storage

Required Reading

Panzura says cloud gateway appliance has no value, so now it’s free
Panzura says a cloud gateway appliance has no value, so its giving it away for free and Google Cloud Storage will throw in 2 TB of free capacity to get customers started.

Cloud storage controller market: One-stop guide
This guide provides perspective on where the cloud storage appliance market has been and where it’s going.

Cloud storage architecture vs. local storage
It can be a challenge to use local storage and cloud storage architecture seamlessly. Learn the key differences and how to bridge the gap with cloud storage gateways.

Master the complexities of using cloud storage
The articles in this drill-down offer insight into the latest cloud technology and tell you the key questions you need to ask your service provider and your storage team.

July 24, 2014  3:55 PM

Word of the Day: OpenStack

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day:

OpenStack is an open source infrastructure as a service (IaaS) initiative for creating and managing large groups of virtual private servers in a data center. The goals of the OpenStack initiative are to support interoperability between cloud services and allow businesses to build Amazon-like cloud services in their own data centers. OpenStack, which is freely available under the Apache 2.0 license, is often referred to in the media as “the Linux of the Cloud” and is compared to Eucalyptus and the Apache CloudStack project, two other open source cloud initiatives.

Quote of the Day

“IaaS is the most basic form of cloud computing; it offers essentially a virtual, bare machine as a service.” – Tom Nolle

Related Terms

virtual machine (VM)
OpenStack Neutron
OpenStack Swift
OpenStack Cinder
RHEL OpenStack platform
vSphere OpenStack Virtual Appliance (VOVA)

Required Reading

OpenStack tutorial: A guide for cloud providers
This OpenStack tutorial explores the hype surrounding this open source project. Get some real-world advice from experts.

Four questions with OpenStack COO Mark Collier
OpenStack COO Mark Collier details the OpenStack roadmap and discusses API compatibility among clouds.

OpenStack networking: Why should we care?
Networking vendors, including Cisco, have been talking OpenStack. Learn why networking pros should care about an open source cloud platform.

OpenStack networking and orchestration: What’s possible?
OpenStack’s networking service, Neutron, integrates the provisioning and management of network resources with the orchestration of the overall IT infrastructure.

July 23, 2014  4:55 PM

Word of the Day: mobile desktop virtualization

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day

Mobile desktop virtualization is the delivery of a virtual machine (VM) image to run business applications on a tablet or smartphone. To the end user, the software applications on the VM — as well as the operating system (OS) and the data associated with the applications — appear as if they are being served from the mobile device. In reality, they are all being served from a data center. When the session ends, the applications will no longer be available on the mobile device and any sensitive data from the session will be stored in the data center and erased from the device.

Quote of the Day

“…running a Windows desktop or application on a mobile device often results in a usability death spiral where users must excessively pan to see missing parts of the screen, or pinch and zoom to access dialog boxes or radio buttons.” – Matt Kosht

Related Terms

desktop virtualization
mobile device management (MDM)
native app
context menu
virtual desktop

Related Tags

Mobile desktop virtualizationEnterprise mobile device management

Required Reading

Mobile desktop virtualization benefits and challenges: Security vs. ease of use
In a mobile workforce desktop virtualization benefits IT but can trouble users.

Using desktop virtualization for BYOD security and management
Learn how desktop virtualization can improve BYOD security in this FAQ.

Does a mobile VDI platform make sense for your users?
Mobile VDI doesn’t fit every use case. Answer these five questions to find out if a mobile VDI platform makes sense for your users.

July 16, 2014  12:57 PM

Word of the Day: COPE (corporate owned, personally enabled)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Word of the Day

COPE (corporate-owned personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones.

Quote of the Day

“Under the COPE model, workers use devices for personal tasks that are within reason, but it’s that ‘within reason’ part that companies have to worry about. On the surface, it might sound like a sensible approach, but trying to get any two people — let alone an entire organization– to agree on what is ‘within reason’ is almost impossible when it comes to personal use.” – Robert Sheldon

Related Terms

mobile device management
mobile application management
application sandboxing
secure container
dual persona

Related Tags

Mobile policy and enforcement for consumerization

Required Reading

The next mobility model: COPE challenges BYOD
The corporate-owned, personally enabled (COPE) model aims to give more control without curbing users’ activities on smartphones and tablets.

BYOD or COPE: Which enterprise mobility strategy is right for you?
Learn about the pros and cons of the BYOD and COPE models so you can make an informed decision about which enterprise mobility strategy to implement in your organization.

BYOD alternatives emerge as tablets outship PCs
COPE has emerged as one of the most talked-about BYOD alternatives because it balances the need to secure mobile devices with users’ desire to conduct personal tasks.

Why the COPE model isn’t a slam-dunk alternative to BYOD
This tip is about the challenges of using the COPE model to enable mobility. Challenges include users’ attitudes toward giving IT control of devices and managing the finances.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: