Word of the Day: Tech Definitions from WhatIs.com


August 9, 2017  4:20 PM

managed service provider (MSP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A managed service provider (MSP) is a company that remotely manages a customer’s IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. Continued…

Quote of the Day

“For MSPs to continue to be relevant, they need to be finding ways to evolve their business. What they need are tools that are going to allow them to serve that need to be not only an IT consultant, but a security consultant at the same time.” – Sean Sykes

Learning Center
How can MSPs evolve into cybersecurity companies?
Managed services providers at ChannelCon 2017 described their journeys of transitioning into cybersecurity companies.

MSP documentation: Why it’s essential to scaling your business
Implementing MSP documentation practices will result in efficiency gains and enable companies to scale better than they could before.

AWS Managed Services adds competition to MSP market
AWS Managed Services competes with independent managed service providers. And while the services ease cloud deployments, learning and price barriers exist.

MSP marketing: Learn the fishing and farming methods
At the MSPWorld 2017 conference, Angela Leavitt of Mojo Marketing outlined two methods that can provide the frameworks for MSP marketing initiatives.

How to create a cybersecurity program for your own MSP
For MSPs, developing and maintaining an in-house cybersecurity program is the first step toward launching an IT security practice.

Trending Terms
MSP platform
managed IT service
channel partner
MSSP
VAR

Writing for Business
In information technology, an ___________ specifies the overall structure, logical components, and the logical interrelationships of an information system.
a. architecture
b. infrastructure
Answer

August 7, 2017  5:49 PM

Schrödinger’s cat

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Quantum computer", Schrodinger's cat

Schrödinger’s cat is a famous illustration of the Copenhagen interpretation of superposition in quantum theory. Continued…

Quote of the Day

“Besides transforming material science, quantum computing could lead to significant developments in artificial intelligence and allow for search or analysis of much more data than can be handled by today’s most powerful machines.” – David Cory

Learning Center
IBM readies quantum computing as a service
A universal quantum computer, available via the cloud, offers the potential for researchers and enterprises to tackle computationally impossible problems.

Can IBM fast-track quantum computing via the crowd?
IBM hails its new cloud-enabled quantum computing service as the birth of the quantum age of computing. Also in Searchlight: Facebook rewards 10-year-old for ethical hacking.

Quantum computing drives the future for Volkswagen
In this week’s Computer Weekly, Volkswagen’s global CIO explains how the car giant is using quantum computing to drive the future of transport.

Google snaps up startup in push to master computer vision
With its purchase of Moodstocks, a machine learning-based image recognition startup, Google keeps pushing into the next frontier — computer vision. Also: C-level exit at Microsoft.

Three CIO communication tips that will change the way you lead
Mark Jeffries argues that knowing these three communication assumptions will turn CIOs and senior IT leaders into better communicators.

Trending Terms
quantum computing
superposition
quantum theory
entanglement
uncertainty principle

Writing for Business
Wave-particle duality is a fundamental __________ of quantum theory.
a. principle
b. principal
Answer


August 3, 2017  5:45 PM

system administrator (sysadmin)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Data Center administration, System administrator

A system administrator (sysadmin) in information technology (IT) is a person who supports a multi-user computing environment and ensures continuous, optimal performance of IT services and support systems. Continued…

Quote of the Day

“System administrator responsibilities require that the sysadmin be something of a jack of all trades when it comes to system and network administration and management.” – Ed Tittel

Learning Center
IT leaders: How the systems administrator role can stay relevant
The traditional systems administrator role is upended by the cloud. IT leaders say those employees can remain relevant, and it starts with learning to code.

What system administrator responsibilities are paramount today?
System administrator responsibilities can cover a broad set of functions ranging from managing an SMB LAN to caring for a complex data center network.

Managing containers challenges system administrator responsibilities
Managing containers is becoming an important aspect of system administrator responsibilities, as container adoption becomes widespread.

How the virtualization system administrator job is changing
The system administrator job has changed over the years, and now requires a candidate with a diverse set of technical skills and a flexible disposition.

New IT job requirements include soft skills, business acumen
IT job requirements have undergone some serious changes over the past year, and job applicants would be wise to update their skill sets accordingly.

Trending Terms
data center administrator
sysop
patch management
virtualization administrator
MCSA
network operating system

Writing for Business
The system administrator’s question was “Will the cost savings of a multi-user environment make up for the difficulty of deploying ____
a. it?”
b. it”?
Answer


August 2, 2017  8:07 PM

dynamic link library (DLL)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Application virtualization, DLL

A dynamic link library (DLL) is a collection of small programs that can be loaded when needed by larger programs and used at the same time. Continued…

Quote of the Day

“Just like executable files, DLL files can contain code, data and resources, such as images, but they can be used by more than one program at the same time.” – Michael Cobb

Learning Center
How do the malware implants RedLeaves and PlugX work?
Malware implants RedLeaves and PlugX have been found on critical systems in multiple industries. Here’s a look at how the malware works.

How serious is a malicious DLL file vulnerability for enterprises?
Malicious DLL files could be used to attack three types of Symantec security products. Find out how the vulnerability works.

Cyber-risk analysis, time are keys to infosec says game theory
Cyber-risk analysis, understanding the enterprise network and designing security to waste attacker time may be keys to cybersecurity, according to game theory.

How do attackers use Microsoft Application Verifier for hijacking?
A flaw in the Microsoft Application Verifier enables attackers to hijack security products, such as antivirus tools. Here’s how to defend against this threat.

Getting runtime application self-protection launched
Buying and launching a runtime application self-protection tool is easier than you may think. Learn how to find the right RASP tool and put it to work.

Trending Terms
device driver
keylogger
MAPI
application firewall
ISAPI
application virtualization

Writing for Business
When using a dynamic link library (DLL), updates are ______ to apply to each module without affecting other parts of the program.
A. easier
B. more easily
Answer


August 1, 2017  7:04 PM

cmdlet

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
cmdlet, Powershell, PowerShell cmdlets

A cmdlet (pronounced “command-let”) is a lightweight Windows PowerShell script that performs a single function. Continued…

Quote of the Day

“The principal advantage to using a PowerShell cmdlet is the ability to automate actions using scripts.” – Stephen J. Bigelow

Learning Center
Automate Active Directory jobs with PowerShell scripts
Follow these simple steps to automate Active Directory tasks with PowerShell, including creating new users from a CSV file.

Is there an advantage to using SharePoint Online PowerShell cmdlets?
Using a Windows PowerShell module, sys admins can automate SharePoint Online tasks that may otherwise be too time-consuming.

Top 25 list of Windows PowerShell commands for administrators
Administrators can learn how to use cmdlets for a variety of simple scripting tasks and manage systems with some of the more common Windows PowerShell commands.

How to run PowerShell cmdlets on remote servers
PowerShell is considered a local management tool, but admins also can use certain cmdlets such as Invoke-Command and New-PSSession in the scripting language to manage multiple remote servers.

Ease migrations with Windows Server Migration Tools cmdlets
Windows Server Migration Tools help administrators with particular tasks, such as moving features from a multi-role server into a group of single-role servers.

Trending Terms
PowerShell
command
help system
command line interface
Microsoft Windows PowerShell Direct
Active Directory domain

Writing for Business
I’ve been ______ my brain but I cannot figure out how to get this script to run. Can you have a look at it?
a. wracking
b. racking
Answer


July 31, 2017  4:15 PM

precision agriculture

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agriculture, Predictive Analytics

Precision agriculture (PA) is an approach to farm management that uses information technology (IT) to ensure that the crops and soil receive exactly what they need for optimum health and productivity. Continued…

Quote of the Day

“Precision agriculture can help reduce significant losses in farming, solve problems of data collection and monitoring, and reduce the impacts of climate change.” – Saverio Romeo

Learning Center
Smart farming technologies produce fertile ground for Agnov8
Smart farming technologies are helping solutions providers and their clients improve crop efficiency and ensure water quality.

Smart farming, IoT only way to feed growing population, says Beecham report
A report from IoT sector analyst Beecham says the agricultural industry will need to embrace smart farming methodologies to support the growing human population.

Interview: How John Deere uses connectivity to make farms more efficient
After pioneering the use of automated vehicle technology 15 years ago, farm equipment supplier John Deere is now going further, with its sights set on efficiency and sustainability, says sales VP Christoph Wigger.

IoT technologies find a home down on the farm
Whether on the farm or in an ocean oil field, IoT technology plays a critical role. Here are two use cases that demonstrate the value of the technology.

Switch from standard BPM for more efficient agriculture
Farmers are ramping up standard BPM with iBPM to conserve resources.

Trending Terms
sustainability
agri-tech
predictive analytics
drone
vertical farming
IoT

Writing for Business
In tropical regions, precision agriculture can use remote sensing to explain why soils _______ nutrients quickly when cultivated.
A. lose
B. loose
Answer


July 28, 2017  4:11 PM

visual analytics

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Data scientist, data visualization

Visual analytics is a form of inquiry in which data that provides insight into solving a problem is displayed in an interactive, graphical manner. Continued…

Quote of the Day

“The BI world has spent the last few years focusing on making reports visually compelling and easy to create, but there’s a lot more to a good report than how it looks.” – Mico Yuk

Learning Center
Many businesses use BI reporting systems wrong, but they can improve
Consultant Mico Yuk offers tips to help businesses avoid some of the most common pitfalls in using BI reporting systems.

Visual data analytics make genomics in healthcare possible
One hospital is using Tableau’s visual data analytics software to effectively leverage genomics in healthcare and improve patient care.

Doors opening for open source data visualization tools
Users of open source data visualization tools say the technologies have become more polished and functional, enabling them to handle much of the visualization load from companies.

The other intersection of IoT and analytics
While BI technology is reasonably mature, we are yet to see exactly where the IoT train is headed and how it will manifest itself in the business world.

Visualizing data forces BI teams to take a deep look at corporate info
Data visualizations have become key components of BI applications. But there’s more than meets the eye to visualizing data for end users through the use of data visualization tools.

Trending Terms
data visualization
data scientist
mobile business intelligence
location intelligence
data management
business analytics

Writing for Business
The ability to visualize data is important now and will only become _______ in the future.
a. more so
b. moreso
Answer


July 27, 2017  7:51 PM

chief data officer (CDO)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Chief Data Officer, Data governance

A chief data officer is a C-level corporate executive who is responsible for an organization’s data governance. Continued…

Quote of the Day

“In many organizations, chief data officer jobs that were centered on defense against risk are giving way to ones emphasizing innovation. To do so, CDOs must nurture a data culture.” – Jack Vaughan

Learning Center
Chief data officer jobs call for nurturing data ethos in companies
Chief data officer jobs will focus more on innovation within a data-driven enterprise, according to panelists at an MIT data symposium.

Gartner: Chief data officer role continues to grow
New research from Gartner shines a light on how the chief data officer role continues to evolve.

Will the role of the chief data officer eclipse that of the CIO?
The role of the chief data officer (CDO) could become a strategic player for the business: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium.

Chief data officer job description requires a proper fit
The chief data officer job description is long and involved. Read about how several CDOs are keeping up with the demands of the position and balancing its challenges and rewards.

Four data management conferences on big data, governance and more
Thinking of signing up for some data management conferences? Here’s a quick rundown of four events focused on topics such as big data and data governance.

Trending Terms
C-level
data governance
data-driven decision management
compliance burden
CIO
data literacy

Writing for Business
The manager who reviewed the proposals found that the quality of the proposals ______ generally good, but several failed to address compliance burdens in an adequate manner.
a. were
b. was
Answer


July 26, 2017  5:49 PM

Node.js

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Node.js

Node.js (Node) is an open source development platform for executing JavaScript code server-side. Continued…

Quote of the Day

“How many of you today are working with the same technology you used 10 years ago? I’m not. Today, most of coding is in Node. Ten years ago, I did a lot of Java and .NET.” – Bob Reselman

Learning Center
The essential skill for implementing DevOps: A desire to learn, always
Here’s a question: What skills are required for practicing and implementing DevOps? The expert practitioners opine, and their answers are surprising.

AWS coding options allow ops and dev to speak same language
Developers have a variety of AWS coding options for building cloud-based applications. IT teams need to determine which programming language works best.

Benefits of developing with Node.js in AWS
Taking hold among cloud-based programmers, developing with Node.js is rising. The beta language eases functions, such as promises and callbacks, and has benefits for AWS customers.

The power of no-code/low-code platforms
Learn about the latest no-code/low-code platforms. Tech expert Zachary Flower discusses how they can improve productivity and usability.

To choose the right PaaS stack, know thyself
A PaaS stack makes building cloud-native applications and using cloud services easier. What isn’t simple is choosing the right PaaS vendor to do so.

Trending Terms
JavaScript
HTTP
event-driven architecture
asynchronous
PHP
Ruby

Writing for Business
Commonly virtualized applications include ____ servers and infrastructure servers.
a. Web
b. web
Answer


July 25, 2017  5:46 PM

algorithmic transparency

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Algorithmic transparency is openness about the purpose, structure and underlying actions of the algorithms used to search for, process and deliver information. Continued…

Quote of the Day

“To achieve data transparency, companies will have to change how data is managed and used. They’ll need to shift from a ‘closed mindset’ where control, information security and compliance are the main objectives, to an open one.” – Nicole Laskowski

Learning Center
Data skeptic Cathy O’Neil explains why we need to regulate algorithms
Cathy O’Neil, a self-professed data skeptic and author, talks about why it may be time to establish a national safety board for algorithms.

The internet of trustworthy things: Can we trust emerging technologies?
As exciting as emerging connected technologies appear on paper, there is still an underlying concern about whether we can trust them.

Open source software security: Who can you trust?
Fears of backdoors and the lack of open source software security have raised concerns for information technology professionals.

Data literacy in high demand; academia responds
Data literacy is a necessary skill in today’s labor market — both inside of IT and outside of it.

Multiple cybersecurity tools protect data on all levels
Modern cybersecurity tools include tried-and-true methods, such as firewalls, as well as unexpected helpers, such as configuration automation.

Trending Terms
transparency
algorithm
SERP
open security
Kerckhoffs principle

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
a. flouting
b. flaunting
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: