Word of the Day: Tech Definitions from WhatIs.com

November 15, 2017  7:01 PM

digital body language (DBL)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Digital body language (DBL) is the aggregate of an individual’s passive and active digital footprints. Continued…

Quote of the Day

“We all leave a digital footprint; little breadcrumbs of our interests in products, movies, music, topics, activities, places, people and pretty much everything.” – Niel Nickolaisen

Learning Center
Where AI meets sales: The benefits of predictive lead scoring
Predictive lead scoring can help companies better prioritize customers, align messaging and determine ways to guide a sales strategy.

The digital footprint: Business boon vs. privacy bane
Like many IT execs, O.C. Tanner CTO Niel Nickolaisen is seeking a balance between digital footprint data mining and the privacy risks it entails.

Predictive marketing tools trump old-fashioned gut feel
Marketers are gaining more customers from predictive marketing tools by vendors like Mintigo and Lattice Engines than traditional lead scoring tools.

AI integration with CRM tools boosts lead scoring processes
As AI technologies continue to build steam, AI integrations with CRM platforms are helping sales teams reap the benefits with predictive lead scoring.

National Police Chiefs’ Council sets out strategy for digital policing
UK police chiefs aim to improve data sharing, integrate IT functions, improve digital intelligence and make digital interactions easier by 2025.

Trending Terms
account-based marketing
digital footprint
lead generation
digital footprint management
lead scoring
named account
system of record (SOR)

Writing for Business
Our data shows that a vast majority of customers prefer Brand A ____ Brand B.
a. to
b. than
c. over

November 14, 2017  6:49 PM

AWS Direct Connect

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Direct Connect is a network service that allows Amazon Web Service (AWS) customers to establish a dedicated network connection between the customer’s data center or collocation environment and Amazon’s servers. Continued…

Quote of the Day

“Services such as AWS Direct Connect, Google Cloud’s Direct Peering service or Azure’s ExpressRoute can facilitate direct connections between an enterprise and the respective cloud provider.” – Stephen J. Bigelow

Learning Center
AWS Direct Connect updates help globe-spanning users
Upgrades to AWS Direct Connect address major shortcomings for enterprises with applications that span the globe to manage their use of AWS offerings.

How can I put an end to AWS network issues?
AWS network issues can affect application performance and workload availability. Cloud customers can mitigate problems with direct connections and tools like AWS Direct Connect.

What are my cloud requirements for implementing direct connections
Major cloud providers, such as AWS and Azure, offer direct connections to their platforms. But what are my cloud computing requirements for establishing one?

Cloud network services adjust to enterprise demands
Cloud network services continue to evolve, as more enterprises use direct connections and other means to bridge their data centers to the public cloud.

Your hybrid cloud environment is a dog, but what kind?
A hybrid cloud environment isn’t a fancy purebred. It’s a mix of connectivity options, integration practices, authentication and governance, says to presenters at AWS re:Invent.

Trending Terms
Amazon EC2
Amazon S3
Amazon DynamoDB
data transfer rate
AWS Import/Export Snowball

Writing for Business
We use Amazon S3 to ________ local storage.
A. complement
B. supplement

November 13, 2017  7:31 PM

IoT gateway

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices. Continued…

Quote of the Day

“By employing edge processing in multi-tiered architectures with intelligent gateways, you allow decisions to be made as close as possible to the edge of the network and require less data to have to travel all the way to the data center.” – James Kirkland

Learning Center
Industrial IoT adoption rates high, but deployment maturity low
IoT adoption by industrial organizations is unsurprisingly on the rise, yet fewer than half have advanced IIoT deployments.

Traveling through enterprise IoT with gateway
Multi-tiered architectures with intelligent gateways allow decisions to be made at the edge, requiring less data to travel all the way to the data center.

Pi or production: Choosing a best-fit IoT gateway prototype
Which IoT gateway prototype is better, Raspberry Pi or a commercial-grade, production-ready gateway? Rigado’s Justin Rigling offers some pointers

The three tiers of a successful enterprise IoT system
The three tiers of the IoT technology stack — sensors, gateways and the data center/cloud tier — need to integrate and communicate with each other.

Key considerations when transitioning from Pi to production
To determine which IoT gateway best supports your technical and budget requirements, advises Rigado’s Justin Rigling, start with these five considerations.

Trending Terms
IoT device
smart machines
edge analytics
PTC ThingWorx
fog computing
Internet of Things

Writing for Business
A number of IoT gateway products ____ equipped with additional security features.
a. is
b. are

November 9, 2017  7:27 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer’s high-speed Peripheral Component Interconnect Express (PCIe) bus. Continued…

Quote of the Day

“For enterprises seeking to get the most out of flash storage, an investment in NVMe technology is becoming a foregone conclusion.” – Scott Sinclair

Learning Center
Are you ready for NVMe storage and the future of flash?
Flash storage shifts the bottleneck to the storage network. NVMe storage technology and NVMe over Fabrics promise to address this problem.

Looking at NVMe storage technologies today and tomorrow
NVMe storage uses the fast NVMe connection protocol and flash-based SSDs. This guide outlines reasons why it might be the right choice for you.

The present and likely future of the NVMe protocol
Data speed in and out of SSDs led to the development of the NVMe protocol. Enterprises quickly saw the value in extending NVMe to storage networks.

How NVMe over Fabrics will change the storage environment
NVMe over Fabrics for high-end networking and the NVMe protocol replacing SCSI and SAS connectivity will each find a place in the data center.

NVMe flash array startups Pavilion Data, Vexata jump in
Most enterprises don’t yet need the performance of an NVMe flash array, but that hasn’t stopped startups from launching new storage products.

Trending Terms
nonvolatile storage
solid-state drive
3D XPoint
NVMe over Fabrics

Writing for Business
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic

November 8, 2017  8:56 PM

black hat

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continued…

Quote of the Day

“Criminal hackers know they must do what they can to test the limits of your application environment, while at the same time, flying under the radar.” – Kevin Beaver

Learning Center
Applying a hacker mindset to application security
Applying a hacker mindset to enterprise security operations can help spot overlooked weaknesses and vulnerabilities. Here’s how.

New cybersecurity report gets the hacker perspective
A cybersecurity report used a hacker survey to detail how adversaries think about attacking enterprise and how to best secure an environment.

Stamos preaches defensive security research in Black Hat keynote
Black Hat 2017 kicked off with Facebook’s Alex Stamos preaching the importance of defensive security research and community diversity.

What are the pros and cons of hiring an ex-hacker?
Hiring an ex-hacker can boost an enterprise’s security stature, but doing so comes with its own risks. Here are the pros and cons of hiring ex-hackers.

Dark web markets’ shutdown may lead to more arrests
The shutdown of AlphaBay and Hansa dark web markets leads to potential data on hundreds or thousands of site vendors and users.

Trending Terms
white hat
ethical hacker
penetration testing
vulnerability analysis
bug bounty program

Writing for Business
Ethical hacking is also known as penetration testing, intrusion ____________.
a. testing, and red teaming
b. testing and red teaming

November 7, 2017  8:50 PM

business continuity plan (BCP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Business Continuity

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continued…

Quote of the Day

“To get the most out of your business continuity plan, you should integrate its upkeep into your daily operations and activities.” – Paul Kirvan

Learning Center
Sample business continuity plan template for small businesses
Are you lacking a business continuity plan or aren’t sure where to start? Download our free sample business continuity plan template for small businesses.

Business continuity planning steps to keep your organization running
These 11 business continuity planning steps provide a comprehensive look at what you need to ensure continual operation during an incident.

Disaster recovery and business continuity plans require updating
It’s not necessary to update disaster recovery and business continuity plans all at once, but it is crucial to review them regularly.

How does business resilience differ from business continuity?
Business resilience has become a prominent element of disaster recovery, but the strategy can’t work without a business continuity plan.

Essential guide to business continuity and disaster recovery plans
Every year, our readers report a lack of confidence in their disaster recovery plan. If you are in that boat, this collection of our best BC/DR content can help.

Trending Terms
risk management
business impact analysis
disaster recovery plan
business continuity software
business continuity management
emergency management plan

Writing for Business
A business continuity plan ______ a number of activities that business continuity software systems can help facilitate and organize.
a. comprise
b. compose

November 6, 2017  8:56 PM

secondary storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Big Data

Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or tape. Continued…

Quote of the Day

“A secondary storage system should restore data quickly and not be impacted by delivering other services at the same time.” – Chris Evans

Learning Center
Secondary data storage: A massively scalable transformation
Interactive, online secondary data storage is making more data directly available to end users and maximizing flash investments.

Navigate the secondary storage system market with these five factors
Data recovery and performance are among the secondary storage system areas you’ll need to analyze when selecting a provider in this new technology market.

A cure for secondary data storage services blues
Secondary data storage vendors need to evolve their products to provide granular data management within converged secondary storage.

Hyper-converged platforms grow to include secondary storage space
Storage vendors are leveraging existing technologies to build products to help hyper-converged systems tackle secondary storage.

Cohesity converged secondary storage adds automation
Cohesity software for converged secondary storage includes an automated policy engine for cloud archiving, data encryption and multisite replication.

Trending Terms
primary storage
nonvolatile storage
data migration
tiered storage
storage snapshot

Writing for Business
Servers equipped with flash storage are increasingly common and can _________ reduce latency.
a. farther
b. further

November 3, 2017  10:21 PM

cloud automation

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud Computing

Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads.  Continued….

Quote of the Day

“There are two camps of tools for automation and orchestration in cloud: provider-native and third-party. To pick the right one, know your future needs, especially for multicloud.” – Alan R. Earls

Learning Center
Compare two types of cloud automation and orchestration tools
Cloud automation and orchestration get complicated, especially with multiple platforms in play. Assess whether native or third-party tools meet your needs.

Brush up your cloud automation and orchestration skills
Cloud automation and orchestration are critical technologies that save IT shops time and money. Use these five tips to implement them correctly.

Streamline cloud operations with Google automation tools
Google automation tools, like Resource Manager and Container Engine, facilitate VM restarts, updates and other tasks. Learn which tool is right for you.

Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.

How DevOps tools can be used to integrate cloud automation
DevOps tools can help with several aspects of cloud automation deployment. Here’s a look at the most commonly used tools.

Trending Terms
logical unit number
cloud orchestrator
IT automation
Infrastructure as Code

Writing for Business
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
a. separate
b. seperate

November 2, 2017  10:14 PM

PCI DSS compliance

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
PCI compliance

Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders’ personal information. Continued…

Quote of the Day

“Overall responsibility for the PCI DSS compliance program may be assigned to individual roles and/or to business units within the organization, but the executive visibility is critical for service providers where protecting cardholder data is central to their business.” – Troy Leach

Learning Center
Enterprise compliance with PCI DSS is up, says Verizon
Compliance with PCI DSS is increasing, according to a Verizon report, but it’s not all good news. Plus, medical device firmware updates are out, and more.

PCI DSS 3.2 focuses on encryption and multifactor authentication
PCI DSS 3.2 includes requirements to strengthen encryption and multifactor authentication.

PCI DSS 3.2 marks the end of major updates to the standard
The PCI council said starting with PCI DSS 3.2, the standard won’t be seeing significant updates, but more incremental modifications.

Can video surveillance improve PCI DSS 3.0 compliance?
Expert Mike Chapple looks at PCI DSS 3.0 compliance and examines if video surveillance can improve physical security around point-of-sale systems.

How can vulnerability scanning tools help with PCI DSS compliance?
Vulnerability scanning tools are mandatory for full PCI compliance, but make sure your organization gets them from a PCI DSS Approved Scanning Vendor.

Trending Terms
PCI Security Standards Council
cardholder data
personally identifiable information
cardholder data environment

Writing for Business
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
a. continual
b. continuous

November 1, 2017  10:13 PM

spear phishing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Continued…

Quote of the Day

“Spear phishing is another core problem for corporations. Cybercriminals use targeted spear phishing of corporations’ emails as one of their most common attack vectors.” – Ben Cole

Learning Center
The art of the cyber warranty and guaranteeing protection
Jeremiah Grossman of SentinelOne talks with SearchSecurity about what it takes to develop a cyber warranty for threat detection products.

Whaling attacks: Taking phishing attacks to the next level
Whaling attacks are becoming more common. Enterprise threats expert Nick Lewis explains how to mitigate this targeted phishing attack.

Educate users to avert email phishing attacks
As email phishing attacks grow in complexity, they lure unsuspecting users to danger. Admins must communicate threats to improve IT security.

Email attacks that threaten networks and flood inboxes
It might not be as hard as you think to identify a phishing attack. Here are the signs of a phishing attack.

For CIOs, email data security should still be a top priority
In this Q&A, the former U.S. Customs and Border Protection CIO discusses why email data security remains a major threat to U.S. cybersecurity.

Trending Terms
Trojan horse
social engineering
email spoofing

Writing for Business
The phishing email warned that unless I updated my contact information, my eBay account would be _________.
a. canceled
b. cancelled

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: