Word of the Day: Tech Definitions from WhatIs.com


December 12, 2016  9:53 PM

smart data

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Edge computing

Smart data is digital information that is formatted so it can be acted upon at the collection point before being sent to a downstream analytics platform for further data consolidation and analytics. The term smart data is often associated with the Internet of Things (IoT) and the data that smart sensors embedded in physical objects produce. Continued…

Quote of the Day

“Take the example of smart hats used on factory floors, for example. If the smart hat detects a carbon monoxide level exception, it vibrates and alerts the person wearing the hat before relaying the data to a central system.” – Arjuna Chala

Learning Center
Plan carefully for IoT edge analytics to avoid network stress
Edge analytics can ease the load on internet of things networks — but plan carefully in concert with the business side, advises consultant David A. Teich.

Mobile edge computing promises wide variety of uses
With lower latency and increased reliability, mobile edge computing stands to benefit networking trends like NFV, IoT and 5G.

IoT and the case for intelligence at the edge
As IoT data grows, our challenge is to develop systems that capture and process data fast, efficiently and at the point where it can have maximum impact. Intelligence at the edge can help.

Edge computing lets IoT systems tap into cloud efficiency
Enterprises adopt edge computing to help IoT systems take advantage of the cloud’s cost efficiency, while still maintaining high response times.

Edge computing becomes ‘Wild West’ of IT world
Amid a varied landscape, edge computing offers potential for growth, but at what cost? Security, performance and bandwidth are all important considerations.

Related Terms
edge computing
IoT
smart sensor
driverless car
actuator

Related Tags
IoT Analytics
Big data analytics

December 12, 2016  4:06 PM

telepresence robot

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Teleconference, Telepresence

A telepresence robot is a remote-controlled, wheeled device with a display to enable video chat and videoconferencing, among other purposes. Continued…

Quote of the Day

“Doctors control the robots, choosing where the robot should be positioned and what data to keep track of for each patient.” – Alex DelVecchio

Learning Center
Telepresence robotics with Nao and Kinect
Using telepresence robotics, you can have an out-of-body experience like in the movie Avatar. Learn how to build such a robotic system.

Channel Chat: Telepresence = robotic technology?
Telepresence is much more than high-definition videoconferencing. It’s also the use of robotic technology to enable remote work in a variety of settings.

Robots in health care: FDA approves monitoring device
The U.S. Food and Drug Administration cleared the “first autonomous navigation remote presence robot” for use in hospitals.

Benefits of video conferencing unlock with flexible setups
It’s difficult to fully achieve the benefits of video conferencing when your deployment is inflexible and doesn’t match user needs.

Telepresence is the next best thing to being there
This article explains how telepresence looks, feels and works, identifies key telepresence providers and provides information to help you determine if an investment in telepresence is right for your organization.

Related Terms
telepresence
teleconference
holographic telepresence
telechir
porta-person

Related Tags
Business video conferencing and telepresence technology
VoIP and unified communications services and technology


December 7, 2016  7:46 PM

noisy neighbor

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
cloud, Virtual Machines, Virtualization

Noisy neighbor is a cloud computing infrastructure co-tenant that monopolizes cloud resources and negatively affects other tenants. The noisy neighbor effect causes virtual machines and applications that share the infrastructure to suffer from uneven performance. Continued…

Quote of the Day

“In general, noisy neighbor is a potential issue with any public cloud service provider, so customers of all sizes need to understand their options for detecting and mitigating problems with cloud bandwidth.” – Dan Sullivan

Learning Center
Navigate noisy neighbor challenges in cloud vs. colocation
When it comes to cloud versus colocation, the multi-tenant challenges can differ. Find the right provider that won’t let noisy neighbors come knocking.

How to restore cloud bandwidth within shared resources
Shared resources on a server can result in a problem called ‘noisy neighbor,’ in which cloud bandwidth is limited. AWS users can avoid the issue.

AWS fends off ‘bouncy’ cloud computing performance perception
Amazon Web Services officials last week looked to dispel the notion that variations in cloud computing performance on EC2 are due to ‘noisy neighbors’ on shared hardware.

Hypervisors complicate storage I/O with blender effect
In this video, expert Howard Marks describes what he calls the I/O blender and noisy neighbor effects of hypervisors and explains why they can be detrimental to storage I/O.

Cloud storage providers moving to all-flash platform
Find out why cloud storage providers are shifting toward an all-flash platform and how to reduce costs by bursting workloads into an all-flash cloud.

Related Terms
bandwidth
bare metal environment
IOPS
cloud load balancing
distributed apps

Related Tags
Network and application performance in the cloud
Colocation hosting and outsourcing management


December 6, 2016  8:50 PM

Rowhammer

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
DRAM, Rowhammer

Rowhammer is a vulnerability in commodity dynamic random access memory (DRAM) chips that allows an attacker to exploit devices with DRAM memory by repeatedly accessing (hammering) a row of memory until it causes bit flips and transistors in adjacent rows of memory reverse their binary state: ones turn into zeros and vice versa. Continued…

Quote of the Day

“Rowhammer is a physical attack and deduplication is part of the operating system, which means anything right on the machine is potentially vulnerable.” – Robert Graham

Learning Center
Does Rowhammer mark a new wave of hardware vulnerabilities?
Experts say that the Rowhammer vulnerability isn’t a worry for enterprises, but it may be the first of a growing number of hardware vulnerabilities.

Drammer proves Rowhammer can be used to root Android
Researchers proved the Rowhammer hardware vulnerability can be exploited reliably on Android in order to allow attackers to gain root access.

Rowhammer exploit: Are Microsoft Edge browser users at risk?
Rowhammer exploits can give attackers read and write access to Microsoft Edge browsers. Find out how enterprises can prevent these attacks.

How to mitigate bit flipping flaw caused by Rowhammer exploits
A flaw in DRAM allows attackers to use Rowhammer exploits to prompt high rates of bit flipping. Find out what this attack does and how to prevent it.

‘Ingenious’ attack mixes memory deduplication with Rowhammer
An exploit combines memory deduplication and Rowhammer to allow read or write memory access.

Related Terms
DRAM
capacitor capacitance
x86-64
cache
Google Project Zero

Related Tags
Emerging information security threats
Hacker tools and techniques, underground sites and hacking groups


December 5, 2016  8:59 PM

flip flops (bistable gates)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
flip flop, integrated circuit, Logic gates

Flip-flops, also called bistable gates, are digital logic circuits that can be in one of two states. Flip-flops maintain their state indefinitely until an input pulse called a trigger is received. When a trigger is received, the flip-flop outputs change state according to defined rules and remain in those states until another trigger is received. Continued…

Quote of the Day

“Found in everything from memories and microprocessors to mobile phones and countless other items, ICs are so woven into our lives that it would be hard to imagine a world without them.” – Jim Tully

Learning Center
Microsoft open tech promises switch hardware independence
New Microsoft open tech provides data center operators with the freedom of mixing networking hardware, without the integration hassles.

50 years of chips
On 12 September 1958, Jack Kilby created a revolution with the world’s first integrated circuit.

Moore’s Law 50 years on: Supercomputing is not just for boffins
On 19 April 1965, Intel’s Gordon Moore outlined his vision of how microelectronics would power the modern world.

Software-defined storage: a proxy for storage transformation
Despite fears of supplier hype, software-defined storage does reflect important trends that affect storage, such as the increasing separation between hardware and software.

Video: Pneumatic chip runs on thin air
The latest in a long line of weird computers runs calculations on nothing more than air.

Related Terms
integrated circuit
Jack Kilby
sequential logic
logic gate
combinatorial logic

Related Tags
Data center network infrastructure
Storage systems hardware


December 2, 2016  10:50 PM

click fraud

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Botnet, click fraud, Ransomware

Click fraud is the practice of artificially inflating traffic statistics for online advertisements. In the common pay-per-click advertising model, advertisers pay a fee for each click on their ad, anticipating that they have attracted a potential customer. Continued…

Quote of the Day

“Ad fraud botnets are being used to inflate the web views all across the internet. It looks as if there is more browsing happening than there actually is.” – Michael Tiffany

Learning Center
How ad fraud botnets are costing companies billions of dollars
Michael Tiffany of White Ops talks with SearchSecurity about how ad fraud botnets are spreading and costing companies billions of dollars a year.

Click fraud to ransomware: Study highlights dangers of malware lifecycle
New research puts the malware lifecycle in the spotlight, explaining how a click fraud malware transformed into ransomware in less than two hours.

Is click fraud malware hiding bigger potential threats?
Simple click fraud malware can be easily changed into more dangerous ransomware. Here’s how to assess the potential of low-level threats.

How does the HummingBad malware enable click fraud?
The HummingBad malware has been used to generate click fraud revenue from 10 million infected devices worldwide. Find out how the malware works.

Machine versus the bots: Does your website pass the Turing 2.0 test?
Robert Richardson questions whether computers can detect the bots vs. real users, as security tools use browser behavior and polymorphism to protect against data theft and fraud.

Related Terms
click farm
phishing
ransomware
botnet
malvertisement

Related Tags
Malware, viruses, trojans and spyware
Web application and Web 2.0 threats


December 1, 2016  9:34 PM

DataOps

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data Science, DevOps

DataOps (data operations) is an approach to designing, implementing and maintaining a distributed data architecture that will support a wide range of open source tools and frameworks in production. Continued…

Quote of the Day

“DataOps is a data management method that emphasizes communication, collaboration, integration, automation and measurement of cooperation between data engineers, data scientists and other data professionals.” – Andy Palmer

Learning Center
Up-and-coming data engineers complement entrenched data scientists
Data engineers come online to do data wrangling and programming. They join vaunted data scientists, who focus more on math and analytics.

Experts advise on data science for business teambuilding
A modern data science for business team should acknowledge that you can’t find all the skills you need in one person. A diverse team can deliver better results.

Emerging: DataOps and three tips for getting there
DataOps and Agile analytics enjoyed a bit of the spotlight at the third annual Boston Data Festival: The Data Mill reports.

Data science team building 101: Cross-functional talent key to success
At BigData TechCon in Boston, data scientists discussed approaches to solving today’s new data analytics problems. A data science team leader touted team-based approaches.

Building data science teams takes skills mix, business focus
Analytics managers offered advice on building data science teams as part of a Strata + Hadoop World 2016 panel discussion on finding and retaining data scientists.

Related Terms
DevOps
LOB
data scientist
BizDevOps
data engineer

Related Tags
Data stewardship
Enterprise data architecture best practices


November 30, 2016  9:13 PM

FRPC Rule 41

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Security, VPN

FRPC Rule 41 is the part of the United States Federal Rules of Criminal Procedure that covers the search and seizure of physical and digital evidence. Continued…

Quote of the Day

“While the changes to Rule 41 are intended to assist U.S.-based investigations, there is nothing stopping judges from applying the legislation globally now that jurisdiction is no longer an obstacle.” – Yorgen Edholm

Learning Center
Rule 41: Why security and privacy experts are wary
Rule 41 of the Federal Rules of Criminal Procedure has security and privacy experts frustrated. Here’s a closer look at the rule and why it’s important.

Risk & Repeat: Will Rule 41 changes become cybersecurity law?
This Risk & Repeat podcast episode discusses the proposed Rule 41 changes, which go into effect on Dec. 1, 2016, and a last-ditch effort to stop them.

Congress floats last-chance bill to delay Rule 41 changes
The Review the Rule Act looks to delay until July 2017 the controversial changes to Rule 41, which would expand government powers to access systems.

Senate bill would quash unlimited Rule 41 government hacks
Read about a Senate effort to limit remote, unlimited government hacking power with a bill to reverse the Supreme Court and Justice Department on Rule 41.

Activists, DOJ spar over Rule 41 changes to enhance FBI searches
Despite DOJ claims that Rule 41 alterations change nothing, protests by a coalition of tech firms, privacy and rights activists led by EFF continue to grow.

Related Terms
anonymous Web surfing
remote access
Electronic Frontier Foundation
botnet
virtual private network
TOR routing

Related Tags
Information security laws investigations and ethics
Government IT security management


November 22, 2016  5:30 AM

canary (canary testing)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
PEN testing, Testing

In software testing, a canary (also called a canary test) is a push of programming code changes to a small number of end users who have not volunteered to test anything. The goal of a canary test is to make sure code changes are transparent and work in a real world environment. Continued…

Quote of the Day

“Plan a canary app rollout for relatively small changes where confidence in the release is high, such as testing problem fixes or regressions.” – Stephen J. Bigelow

Learning Center
Automated out of a job? Results from the Harvey Nash Technology Survey
The Harvey Nash Technology Survey 2017 shows software testers and others fear automation may eliminate their jobs. Here’s what to prepare for.

Improve application rollout planning with advanced options
The right application deployment plan makes all the difference. Consider these three techniques during rollout planning.

Want disciplined DevOps software delivery? It takes six steps
If the goal is disciplined DevOps software delivery, get ready to make some changes. Expert Yvette Francino explains.

Dissect DevOps problems with this expert podcast
DevOps problems arise due to a litany of reasons, ranging from implementation to lack of a proper culture change. Learn to tackle these problems at the source.

For web companies, optimizing CI/CD mandates an IT infrastructure upgrade
Continuous integration and deployment aren’t just about the developer experience — they also often necessitate an IT infrastructure upgrade.

Related Terms
testing
A/B testing
sandbox
bug
pen testing

Related Tags
Agile DevOps
Application rollout planning and problems


November 18, 2016  9:21 PM

predictive modeling

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
CRM, Predictive Analytics, predictive modeling

Predictive modeling is a process that uses data mining and probability to forecast outcomes. Continued…

Quote of the Day

“In looking to unleash effective and speedy predictive modeling techniques in an organization, bringing a standard business intelligence mindset to the process won’t cut it.” – Mike Lampa

Learning Center
How predictive modeling and forecasting failed to pick election winner
Predictive modeling and forecasting this election cycle failed to see the Drumpf phenomenon coming and missed the mark by a mile in their predictions.

Faster modeling techniques in predictive analytics pay off
Businesses can’t let data scientists get bogged down in academic predictive modeling techniques. If the process doesn’t pay off, it’s time to reevaluate priorities.

Big data analytics projects raise stakes for predictive models
Big data analytics projects can sink or swim based on how organizations cope with technical and skills issues that must be considered as part of the analytical modeling process.

Talking Data podcast: Predictive modeling techniques
This edition of Talking Data examines the finer points of predictive modeling techniques.

Building predictive analytics models takes a team effort
Analytics managers say data scientists should put algorithms through the wringer when building predictive analytics models to ensure that the models deliver valid results.

Related Terms
predictive analytics
data mining
CRM
capacity planning
change management

Related Tags
Data modeling tools and techniques
Predictive analytics


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: