Word of the Day: Tech Definitions from WhatIs.com


May 26, 2017  7:07 PM

AWS CloudTrail

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Amazon CloudTrail, AWS

AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS). Continued…

Quote of the Day

“CloudTrail is an innovative solution to a thorny problem: logging events in a cloud environment and storing and managing those logs in a simple way.” – Dave Shackleford

Learning Center
AWS careers benefit from skills, not certifications
AWS careers are on the rise; IT professionals need to worry more about diversifying their skill sets than obtaining AWS certifications.

Amazon CloudTrail: How it could change cloud logging
CloudTrail, a new cloud logging service from Amazon, endeavors to simplify event management for security professionals migrating IT resources to the cloud.

Proper tools improve AWS cloud developer productivity
Native AWS tools and third-party utilities facilitate developer productivity with improvements to continuous delivery and health monitoring.

Police your public cloud with AWS CloudTrail
AWS CloudTrail provides an array of options for Amazon Web Services customers to protect their resources in the cloud. Get up to speed with the native security and compliance tool.

New CloudTrail features help verify API calls, AWS usage
AWS usage can be monitored via AWS CloudTrail, which now features more efficient ways to verify calls to cloud resources.

Related Terms
AWS
application program interface
Amazon S3
Amazon SNS
log

Related Tags
AWS support licensing and SLAs
Public cloud computing security

May 25, 2017  3:40 AM

voice signature

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
biometric, Encryption

A voice signature is a type of electronic signature that uses an individual’s recorded verbal agreement in place of a handwritten signature. Continued…

Quote of the Day

“Voice has been around awhile. When you call into a call center, there is a good possibility that your voice is being evaluated for antifraud purposes.” – Brendon Wilson

Learning Center
Barclays replaces passwords with voice authentication
A new voice authentication system has been rolled out at financial services firm Barclays and will replace customer passwords with voiceprints.

Mobile endpoint security: What enterprise infosec pros must know now
Achieving mobile endpoint security can be tough. This essential guide walks security pros through its many aspects.

What’s next for mobile biometrics
Mobile biometrics can authenticate users based on their fingerprint, iris and more, allowing mobile IT admins to bypass hated password or PIN requirements.

How mobile biometrics can strengthen security
Mobile biometrics, such as iris and facial scanning, is making its way into the enterprise, and is poised to replace usernames and passwords.

Learn about user authentication methods, from passwords to biometrics
The password might not be dead but that doesn’t mean it’s working. This guide looks at how other user authentication methods can supplement it.

Trending Terms
can you hear me?
Electronic Signatures in Global and National Commerce Act
biometric verification
voiceprint
biometrics
encryption

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


May 24, 2017  7:37 PM

churn rate

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Churn, Customer churning

Churn rate is a measure of the number of customers or employees who leave a company during a given period. It can also refer to the amount of revenue lost as a result of the departures. Continued…

Quote of the Day
“Turnover is a reality in any organization, so it’s wise to have a pipeline for new talent coming into the organization.” – Ernie Hayden

Learning Center
Corporate wellness software can help employers reduce turnover
Wellness programs are integral to employee engagement and retention, according to data from a corporate wellness software vendor.

The link between employee engagement and customer experience
Some experts argue that the secret to a good customer experience is engaged employees, and that principle goes beyond contact centers to the company at large.

Don’t let false assumptions drive your customer communication strategy
Companies often assume they know their customer base and dial in customer communications. Here are three tactics to ensure your communication strategy is on target.

Effectively use surveys to measure and increase employee engagement
Learn how one HR executive partnered with a survey provider to measure his organization’s employee engagement and analyzed it against benchmarks.

Marketing company uses in-database analytics to fight customer churn
Trident Marketing employed an IBM Netezza in-database analytics data warehousing appliance and Fuzzy Logix libraries to beat customer churn.

Trending Terms
customer satisfaction
predictive technology
employee churn
leaky bucket
monthly recurring revenue

Writing for Business
The amount money a customer invests in a service can reduce a company’s churn rate and increase the chances they’ll stick with around for the long ______.
A. haul
B. hall
Answer


May 23, 2017  7:28 PM

R programming language

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Open source, Predictive Analytics, R language

The R programming language is an open source scripting language for predictive analytics and data visualization. Continued…

Quote of the Day

“In addition to being well-suited to advanced statistics, R’s open source nature and free availability under the GNU General Public License have also contributed to its rising star power.” – Robert Sheldon

Learning Center
The ins and outs of using R in SQL Server 2016 and 2017
Using R in SQL Server 2016 and 2017 could benefit enterprise users, but it’s important to know the difference between Microsoft’s various R-based technologies.

R programming language demands the right use case
R’s growing popularity among programmers and organizations has attracted the attention of technology vendors, many of which now offer R-based products or support the language in their own software.
IBM Watson gets CognizeR extension

In the past, R has been criticized for delivering slow analyses when applied to large data sets, but more recent versions of the language are attempting to address this problem.

Revolution brings R programming language to AWS, plus SAS on Hadoop
Revolution Analytics brings the R programming language to the cloud, while SAS readies a new in-memory analytics platform to run on Hadoop.

Data preparation steps increase to meet predictive analytics needs
Data scientists building predictive models and machine learning algorithms often have to do more data preparation work upfront than is necessary in conventional analytics applications.

Trending Terms
open source
predictive analytics
data visualization
loop
data scientist

Writing for Business
Linus Torvalds _______ choosing to be an open source software engineer is a calling, rather than a career choice.
a. said that
b. said
Answer


May 22, 2017  5:25 PM

seven wastes

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
DevOps, Kaizen, Lean processes

The seven wastes are categories of unproductive manufacturing practices. Continued…

Quote of the Day

“Lean methodologies are centered around learning: from your customers, your data and from every line of code you build and put in front of customers.” – Christopher Ward

Learning Center
Comparing development methodologies: Agile vs. DevOps vs. Lean Startup
If comparing development methodologies is getting to be a bit much, expert Christopher Ward has the answer. Here’s his take on Agile, DevOps and Lean.

How can lean manufacturing concepts be used with MRP and ERP?
Lean manufacturing concepts use a pull technique, while MRP and ERP use push. Can these opposing concepts play nice?

Smart manufacturing technology is a dumb idea without good leadership
The CEO of Miller Ingenuity explains why the smart manufacturing technology revolution demands an educated workforce and respectful leadership.

A DevOps primer: Start, improve and extend your DevOps teams
Turning to DevOps teams may seem to be the logical next step for your enterprise. This guide covers best strategies from start to finish.

Go beyond Agile, or miss out on the fourth industrial revolution
IT leaders must go beyond Agile if they aim to take advantage of the fourth industrial revolution.

Trending Terms
just-in-time manufacturing
lean programming
Toyota Way
kaizen
agile software development
DevOps

Writing for Business
Taiichi Ohno studied supermarket operation for _______ before developing Toyota’s rules for lean production.
a. awhile
b. a while
Answer


May 19, 2017  7:55 PM

Net Neutrality (open internet)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Net Neutrality

Net Neutrality is the principle that data packets on the Internet should be moved impartially, without regard to content, destination or source. Continued…

Quote of the Day

“The primary foundation of net neutrality explained is this: Providers should not be able to give services they offer any advantage over a competing service running over their network.” – Russ White

Learning Center
Net neutrality explained: The idea is simple, but appearances deceive
When it comes to net neutrality explained, there’s more to it than just treating every packet the same.

Net neutrality law: Much ado about nothing?
President Drumpf’s free-market pick for the FCC might dismantle net neutrality law, but some industry watchers say that’s not such a big deal.

In aftermath of FCC privacy rules repeal, uncertainty, ironies abound
ISPs stand to make billions from the rollback of FCC privacy rules, but does the move hurt our success in the data economy? Also: brain-computer interfaces.

Does Internet neutrality shake up IoT plans?
The Internet of things is generating more data, but what happens when Internet neutrality affects how that information is received? Find out how Net neutrality challenges IoT.

Why SDN and NFV thinkers should care about net neutrality
Now that a circuit court struck down net neutrality rules, will SDN and NFV be used as tools to create an anti-competitive Internet?

Trending Terms
net bias
two-tiered Internet
common carrier
edge provider
zero rating
telecom carrier

Writing for Business
Telecom carriers are increasingly making a ______ into cloud services.
a. segway
b. segue
Answer


May 17, 2017  6:41 PM

bill of materials (BoM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Bill of Materials, Manufacturing

A bill of materials (BoM) is a list of the parts or components that are required to build a product. Continued…

Quote of the Day

“Engineering and manufacturing must work together to be sure that their separate, but related versions of the BOM are always in sync and up to date.” – Dave Turbide

Learning Center
What’s holding back growth of 3D printing and additive manufacturing?
Whether 3D printing and additive manufacturing can grow beyond small-scale manufacturing depends on the industry getting together on machines, standards and education.

Are both an engineering bill of materials and a manufacturing BOM needed?
Manufacturers need an engineering bill of materials and a manufacturing bill of materials for any given product. Here’s why.

Use SAP MRP to effectively plan production and procurement
The SAP MRP module can optimize production or procurement plans. An expert explains how to use it for consumption-based planning and material requirements planning.

Manufacturing tips for Kanban production control and BOM management
Discover how Oracle E-Business Suite supply chain management (SCM) software helps manufacturers with Kanban setup and production control. Find out how Oracle SCM software can improve bill of materials (BOM) management.

Manufacturing requirements planning: The four critical questions answered
Read a key chapter in the recently revised and updated “Orlicky’s Material Requirements Planning,” considered by some to be a landmark book by one of the pioneers of MRP.

Trending Terms
manufacturing process management
engineering bill of materials
computer-aided design
material requirements planning
supply chain management

Writing for Business
The user found that the application worked well if she could get the phone view ________ with the package barcode.
a. orientated
b. oriented
Answer


May 16, 2017  4:18 PM

infosec

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Infosec

Infosec (information security) is a set of strategies for managing the processes, tools and policies necessary to prevent, detect, document and counter threats to digital and non-digital information. Continued…

Quote of the Day

“[Trump’s executive order] is not a plan to fix the federal government’s cybersecurity challenges. Instead, it’s a directive to each agency to implement the NIST framework to assess the agency’s cyber risks and create plans to mitigate them.” – Leo Taddeo

Learning Center
Trump cyber executive order focuses on cyber-risk management
The directive forces agency and department heads to demonstrate the degree to which they have strategically viewed cybersecurity risk.

Six keys to creating strong data-security measures
The need for effective data-security measures is more critical than ever before. Here’s why, as well as six information-protection best practices.

Tabletop cybersecurity exercises essential to infosec training
As companies stare down seemingly endless sources of data threats, tabletop cybersecurity exercises are a great way to kick start infosec training efforts.

How infosec professionals can improve their careers through writing
Infosec professionals should look to raise their profiles and reputations. Expert Joshua Wright explains how infosec careers can benefit from writing.

Mobile endpoint security: What enterprise infosec pros must know now
Achieving mobile endpoint security can be tough. This essential guide walks security pros through its many aspects.

Trending Terms
risk management
information assets
confidentiality, integrity and availability
defense in depth
ISO 27001
Federal Information Security Information Act

Writing for Business
The security of clients’ personal information is of _______ importance.
a. upmost
b. utmost
Answer


May 15, 2017  6:26 PM

ransomware

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Encryption, malware, Ransomware

Ransomware is malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks. Continued…

Quote of the Day

“Ransomware attacks happen, but the important thing is to minimize the impact and demonstrate a timely recovery.” – Mike O. Villegas

Learning Center
Ransomware protection best served by backing up your data
Good data storage practices and effective data backup are the best approaches when it comes to offering ransomware protection in your company.

Ransomware threat continues to evolve, defense needs to catch up
Ransomware threat abounds, but RSA Conference 2017 speakers say victims should avoid paying ransoms and weigh their options to access critical data.

Why healthcare ransomware attacks are a growing threat to health IT
Healthcare ransomware attacks plagued hospitals in 2016: experts predict the threat will rise in 2017 due to outdated systems and lax security practices.

Five ways to prevent a ransomware infection through network security
A ransomware infection can be stopped in its tracks by strong network security. Here are five simple steps enterprises can take to bolster their networks.

Cheap ransomware as a service arrives for malicious actors
The Karmen ransomware as a service offers a very low price and interesting features for the enterprising malicious actor.

Trending Terms
cyberextortion
cryptoperiod
malware
encryption
doxware
infosec

Writing for Business
Ransomware hasn’t been in the news for _______ but it seems to be making a comeback.
a. a while
b. awhile
Answer


May 12, 2017  6:20 PM

privilege creep

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Identity & Access Management

Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. Continued…

Quote of the Day

“Manually trying to manage a large number of users’ privileges is a time-consuming and resource-draining process and will lead to mistakes and oversights.” – Michael Cobb

Learning Center
Enlightened shadow IT policy collaborates with users
A shadow IT policy that manages risk has to change with the times, as cloud services offer users easy access to necessary apps.

Shadow apps in the cloud threaten IT data governance
Deploying cloud apps can take far less time than going through IT to do the same work on premises. But these shadow apps cause IT data governance issues.

Beyond shadow IT risks, opportunity awaits
Shadow IT risks pose a threat to the enterprise, but, when properly managed, the use of unsanctioned apps can lead to new cloud computing innovations.

Build a shadow IT strategy all departments will love
To build a successful shadow IT strategy, IT pros must remember that, in many cases, shadow apps meet a business need that existing IT systems don’t.

Shadow IT cited as reason why some firms lack formal cloud strategy
New research from VMTurbo suggests firms are using cloud, even if they claim not to have a formal private or public deployment plan in place.

Trending Terms
feature creep
identity access management (IAM) system
access governance (AG)
access recertification
privilege escalation attack

Writing for Business
I’ve saved the folder to Dropbox and will send the link to _________.
a. he and Charles
b. him and Charles
c. Charles and he
d. Charles and him
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: