Word of the Day: Tech Definitions from WhatIs.com


April 21, 2017  5:21 PM

agile test automation pyramid

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agile, Automation

The agile test automation pyramid is a graphical strategy guide for implementing automated software testing. The pyramid was introduced by Mike Cohn in his book, “Succeeding with Agile.” Continued…

Quote of the Day

“While some amount of evangelizing may be necessary to get started, scaling Agile depends more on ambassadorship and the ability to collaborate to ensure successful delivery of outcomes.” – Mark Tonsetic

Learning Center
Running Agile at scale: Three challenges
CEB: Running Agile at scale will require CIOs to rethink how they cultivate product managers, seek funding and deliver business value.

Use Agile software testing principles to plan your tests
Two Agile software testing approaches — testing quadrants and the test automation pyramid — will put you on your way to creating a solid strategy to fully test your applications.

What you need to know about software testing automation
Software testing automation is in full swing. This guide covers testing best practices and the software testing tools needed to move toward automation.

Devising a test automation strategy: Getting started
CIOs, QA directors and project managers have heard about the benefits of test automation, yet often don’t know where to begin. In this tip by Agile expert Lisa Crispin, you’ll learn the important steps to move your organization forward with a well-planned automation strategy.

Best practices for implementing a mobile test strategy
Learn how a good mobile test strategy can enable faster iterations and time to market. A test automation framework can help implement business goals faster.

Trending Terms
automated software testing
agile software development
unit testing
quality assurance
test-driven development

Writing for Business
According to Mike Cohn, Agile planning ___________ change by recognizing that it will occur.
a. accommodates
b. accomodates
Answer

April 20, 2017  1:57 PM

System Center Virtual Machine Manager (SCVMM 2012)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
SCVMM, Virtualization

System Center Virtual Machine Manager (SCVMM 2012) is Microsoft’s virtualization management product. Several core components make up the foundation for SCVMM’s more advanced functionalities: manager server, library server, manager database, administrator console and virtual machine host. Continued…

Quote of the Day

“SCVMM templates and SCVMM service templates can help deploy production VMs and grouped VMs quickly. They can also redeploy VMs, if there are issues with existing VMs.” – Nirmal Sharma

Learning Center
Use PowerShell to export, back up SCVMM service templates
Use these simple PowerShell cmdlets to query and export all of the service templates you’ve created in SCVMM by name with associated details.

SCVMM 2016 tips: Hot adding vNIC and modifying memory for running VMs
Learn how to hot add virtual network interface cards and modify memory for a running VM in SCVMM 2016 through PowerShell cmdlets.

Set VM failover priority levels with SCVMM
By setting VM failover priority through SCVMM, you can ensure that your most important VMs will receive the resources they need in a failover situation.

Wrangling your Hyper-V nodes into an SCVMM cluster
From creating the proper conditions for Hyper-V nodes to setting up storage devices, in order to deploy highly available Hyper-V clusters with SCVMM, you’ll need to lay the right groundwork first.

SCVMM 2012 R2: Exploring storage support options for virtualization
SCVMM provides an easy way to manage storage by means of storage classification.

Trending Terms
private cloud
Microsoft System Center 2012
virtual machine
Microsoft Hyper-V 3.0
VMware vSphere
systems management
PowerShell

Writing for Business
The book “Virtualization for Dummies” provides a ___________ explanation of virtualization that helps readers achieve a basic level of understanding.
a. simplified
b. simplistic
Answer


April 19, 2017  4:47 PM

cloud engineer

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud architecture, Cloud engineering

A cloud engineer is an IT professional responsible for any technological duties associated with cloud computing, including design, planning, management, maintenance and support. Continued…

Quote of the Day

“A cloud engineer must create an IT environment that can support the scale, flexibility and availability of cloud technologies, while meeting business goals and ensuring governance.” – Stephen J. Bigelow

Learning Center
Cloud engineering jobs demand mix of technical, business skills
Cloud engineering jobs demand a mix of soft and technical skills. Find out what experience and education is required to get hired today.

Test your cloud knowledge in this cloud computing quiz
In this cloud computing quiz, find out if your cloud computing skills stack up. How much do you know about the IT functions and programming languages being used in the cloud?

Amazon Cloud Directory adds and removes flexibility
Amazon Cloud Directory adds flexibility and scalability to data management on AWS, but it also increases the potential lock-in on the platform.

Cloud computing careers reshaping IT jobs market
Cloud computing technology has caused a shift in the IT job market. Cloud computing careers include new titles, such as cloud architect.

Five things to know to land a cloud architect job
To land a cloud architect job, IT pros need to take a big-picture approach to the data center, and be up-to-speed on emerging technologies like containers and IoT.

Trending Terms
cloud architect
cloud computing security
Amazon Web Services
DevOps
OpenStack

Writing for Business
“Thanks to all who ensured that the cloud migration went smoothly. There will _______ be a little something extra in your pay envelopes this week,” the manager announced.
a. definitely
b. defiantly
c. definately
Answer


April 18, 2017  5:18 PM

NAND flash wear-out

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Flash memory, NAND Flash

NAND flash wear-out is the breakdown of the oxide layer within the floating-gate transistors of NAND flash. Continued…

Quote of the Day

“While NAND flash technology ushered in the solid-state era, it is really just the harbinger of products to come that will challenge the traditional concepts of memory and storage.” – Rich Castagna

Learning Center
The status of NAND flash memory now and in the near future
As the NAND flash memory shortage eases, 3D NAND, and even more advanced technologies, promise a bright flash future for storage.

NAND flash technology is just the beginning
NAND flash technology delivers a high level of performance at a high rate of speed, but storage vendors are developing products that will greatly expand solid state’s role.

How NAND flash degrades and what vendors do to increase SSD endurance
Storage Switzerland senior analyst Eric Slack dives into the technical aspects of SSD cell degradation span and what vendors are doing to increase SSD endurance.

NAND flash shortage has SSD supply, pricing impact
NAND flash shortage could slow price declines and strain SSD supplies as manufacturers confront challenges in a shift from 2D to denser 3D technology.

Best practices for solid-state drive storage technology
Solid-state drive storage (SSD) technology best practices center on identifying I/O-intensive applications so that data storage technology can provide the greatest benefit to IT organizations. Here are our top 10 best practices for SSDs.

Trending Terms
NAND flash memory
solid-state storage
3D NAND flash
MLC flash
SLC flash

Writing for Business
Servers equipped with flash storage are increasingly common and can _________ reduce latency.
A. farther
B. further
Answer


April 17, 2017  8:18 PM

gateway

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud gateways, GATEWAY

A gateway is a network node that connects two networks using different protocols together. Continued…

Quote of the Day

“Each organization has unique requirements, needs and environments, so, similarly, admins must tailor the product evaluation process for determining the best email security gateway to their own enterprise.” – Karen Scarfone

Learning Center
Comparing the best email security gateways
Expert Karen Scarfone makes recommendations for selecting the best email security gateways for the needs of readers’ organizations.

IoT gateways point way forward for manufacturers
Drawing on new software, reference designs and hardware such as IoT gateways, manufacturers now have more tools to help deploy the IoT faster and more efficiently.

Five criteria for selecting an email security gateway product
Expert Karen Scarfone explains how organizations can evaluate enterprise email security gateway products to determine which one is the best fit.

Using an IoT gateway to connect the “Things” to the cloud
An IoT gateway plays a critical role in connecting Internet of Things devices with the Internet, acting as a bridge between the two.

Your device is insecure. Use a gateway.
We must have a plan B for when security breaks down. Approaching IoT as an architecture in which devices are protected behind a gateway is a good start.

Trending Terms
proxy server
SD-WAN
cloud storage gateway
WAF
email security gateway

Writing for Business
This isn’t a problem for most organizations today, but potential storage limits should ________ be considered when planning a new gateway deployment.
A. always
B. all ways
Answer


April 14, 2017  2:32 PM

source code

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Source code

Source code is the fundamental component of a computer program that is created by a programmer. Continued…

Quote of the Day

“With the presence of Web applications across virtually every facet of the business, it’s important that you do what you can to minimize your security risks. This is where testing your actual source code comes into play.” – Kevin Beaver

Learning Center
Commercial code riddled with open source vulnerabilities
Vendors, as well as customers, are blind to unpatched open source vulnerabilities in commercial applications; OpenSSL patches high-severity bugs.

Open source network software promises major industry shifts
Industry experts say open source network software can solve longtime networking problems and frustrations in the enterprise.

How do I deploy secure open source code for cloud?
To ensure you’re using a secure open source code for the cloud, check the code’s design and documentation, and test for potential vulnerabilities.

Open source code reuse: What are the security implications?
Open source code reuse poses a risk to application security when the code has vulnerabilities. Expert Michael Cobb suggests security measures when reusing code.

Open source code management: How to safely use open source libraries
For enterprise developers to securely use code from open source libraries and frameworks, better open source code management is needed, according to expert Michael Cobb.

Trending Terms
codebase
source code analysis
object code
fork
open source

Writing for Business
Open source describes any software whose source code is in the public domain or that is copyrighted and distributed under an ____________.
a. open source license
b. open-source license
Answer


April 13, 2017  5:49 PM

infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud infrastructure, Converged infrastructure, IT Infrastructure

Infrastructure is the foundation or framework that supports a system or organization. Continued…

Quote of the Day

“The future of IT infrastructure is to create and support resource groupings that support VMs, containers and serverless platforms.” – Keith Townsend

Learning Center
The real future of IT infrastructure lies in abstraction
Containers are just a stopgap as the future of IT infrastructure increasingly heads to abstraction between servers and the ‘serverless’ services that use them.

Four infrastructure technologies to watch in 2017
Cloud, NFV and hyper-convergence will be among the most important infrastructure technologies to be deployed in the next 12 months, writes Andrew Froehlich.

Brace your infrastructure for a microservices approach
Despite microservice benefits, such as faster deployment and better scalability, enterprises need to prepare for their impact on the underlying infrastructure and network.

Five hybrid IT infrastructure breaking points
Learn the five biggest challenges presented by hybrid IT infrastructure running business-critical apps, and how to approach them with the right tools.

Use infrastructure as code to simplify hybrid, multicloud management
When using infrastructure as code for hybrid and multicloud management, make sure it keeps its own identity from DevOps.<

Trending Terms
converged infrastructure
cloud infrastructure
wireless WAN
colocation
Infrastructure as a Service

Writing for Business
_________ of the cost, we should seriously think about moving to a converged infrastructure.
A. Irregardless
B. Regardless
Answer


April 12, 2017  5:30 PM

ITIL (Information Technology Infrastructure Library)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
DevOps, ITIL

ITIL (Information Technology Infrastructure Library) is a framework designed to standardize how information technology (IT) services are selected, planned, delivered and supported. Continued…

Quote of the Day

“When you build DevOps on top of ITIL, there’s control, but it moves the ball forward with bite-sized units of work.” – Doug Tedder

Learning Center
It’s ITIL and DevOps, not ITIL or DevOps
With better automation tools and more practical training, IT shops can combine ITIL and DevOps for continuous and controlled change.

Release management best practices for every IT team
Release management best practices start at design — and they don’t stop on the deployment date. Here’s how to keep production safe during code releases.

Real-life change management examples prove it’s harder than it looks
These change management examples illustrate the dangers of change, the importance of communication and the options IT shops have to get it right.

Falling back on bad habits in a DevOps organization
A new DevOps organization faces challenges picking the rights tools and setting boundaries. Make your transition smoother by learning from others’ experiences.

Guide to building a better IT team structure
Is your IT team structure affecting daily operations? Stop thinking about your employees’ worth in dollars and consider how training and DevOps can improve your business.

Trending Terms
ITIL v3
ITSM
infrastructure management
release management
DevOps
Microsoft Operations Framework

Writing for Business
The Agile Manifesto _______________: Collaboration should be more important than contract negotiation.
a. nailed it
b. hit the nail on the head
c. hit the nose on the head
d. nailed it on the head
Answer


April 11, 2017  7:56 PM

Web application firewall (WAF)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
firewall, PCI DSS, WAF

A Web application firewall (WAF) is a firewall that monitors, filters or blocks data packets as they travel to and from a Web application. Continued…

Quote of the Day

“Although WAFs are most helpful for applications where source code is not available, other applications benefit because WAFs can provide protection during the period between the discovery of a vulnerability and the release of updated source code.” – Karen Scarfone

Learning Center
Stop app attacks with a Web application firewall
App attacks are increasing and web application firewalls are a key to halting them. Learn how to determine which WAF is best for your enterprise.

Business-use scenarios for a Web application firewall deployment
Expert Brad Causey outlines the business cases for deploying Web application firewalls (WAFs) and explains how they protect organizations with applications exposed to the Internet.

How cloud WAF implementations can improve application security
Cloud WAF provides protection for applications hosted off-site or in the cloud. Learn about how providers filter traffic and transfer logs to enterprises.

Four questions to ask before buying a Web application firewall
Expert Brad Causey outlines the important questions enterprises need to ask when buying Web application firewalls to make sure they are procuring the right WAF for their business needs.

What are the compliance requirements for Web application firewalls?
Why organizations are opting for Web application firewalls and how to keep them up to date with compliance mandates for maximum security protection.

Trending Terms
cross-site scripting
PCI DSS
SOAP
zero-day exploit
AWS Web Application Firewall
next-generation firewall

Writing for Business
A Web application firewall (WAF) is able to detect and _____ new unknown attacks by watching for unfamiliar patterns in the traffic data.
A. avoid
B. prevent
Answer


April 10, 2017  9:00 PM

non-disclosure agreement (NDA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Intellectual property, NCA, NDA

A non-disclosure agreement (NDA), also known as a confidentiality agreement, is a legally binding contract in which one party agrees to give a second party confidential information about its business or products and the second party agrees not to share this information with anyone else for a specified period of time. Continued…

Quote of the Day

“Having an NDA in place early in the process protects both parties, and may encourage vendors to share information on future product development plans.” – Al Berg

Learning Center
Data center security concerns with contractors: Advisory Board Q&A
Background checks and supervision of outside contractors can help preserve physical data center security.

Becoming jaded with Security BSides’ Jack Daniel
The financial success of the security industry has created ‘breach’ ambulance chasers. Marcus Ranum chats with Security BSides’ cofounder Jack Daniel about a return to grassroots.

Business legal advice for solution providers: Managing crises and contracts
At ConnectWise IT Nation 2013, attorney Bradley Gross provides business legal advice for solution providers, addressing the most common problems they’re likely to run into.

With data breach costs soaring, companies should review data sharing policies
Companies are sharing intellectual property in increasing numbers, but many organizations fail to monitor and enforce their policies, according to a recent survey.

Breaches reignite intellectual property protection
Even with DLP controls in place, intellectual property theft remains the elephant in the room for companies, dwarfing revenues lost by PII and other data security incidents.

Trending Terms
golden handcuffs
non-compete agreement
intellectual property
industrial espionage
insider threat
sensitive information

Writing for Business
A security policy should stipulate requirements for each department to _______ that confidential information and technologies are not compromised.
a. insure
b. ensure
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: