Word of the Day: Tech Definitions from WhatIs.com


August 24, 2017  6:34 PM

Inbox Zero

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Email management, inbox

Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty — or almost empty — at all times. Continued…

Quote of the Day

“IT professionals seem to have changed their tune, especially as more and more emails flood inboxes and end users try to achieve the holy grail of Inbox Zero.” – Diana Hwang

Learning Center
The Top 5 Disadvantages of Not Implementing an Exception Inbox Zero Policy
How and why should you apply an inbox zero policy when it comes to your exceptions.

Microsoft’s email Clutter tool helps to attain Inbox Zero
IT pros look at Office 365’s email Clutter with a less skeptical eye, noting its ability to personalize end users’ inboxes with only relevant messages based on user behavior.

Fix outdated working practices to solve productivity puzzle
The Economist says the French could take Friday off and still produce more than Britons in a week. Can smarter use of technology fix this?

New technology competes to become email replacement
Collaboration services such as Slack seek to displace email where others have tried and failed. Is a viable email replacement on the horizon?

Email attacks that threaten networks and flood inboxes
Several types of email attacks plague user inboxes and the enterprise network. It’s up to the email admin to thwart intruder viruses and spam.

Trending Terms
email management
email bankruptcy
time management
email response management service
disappearing email

Quiz Yourself
This is a way for organizations to dictate how email messaging is used in a corporate setting. It also addresses how to secure information that is exchanged via the email system.
A. email governance
B. email management
Answer

August 23, 2017  6:25 PM

H-1B

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
H-1B visas

H-1B is a United States Immigration Service visa classification that permits employers to hire highly skilled foreign workers who possess theoretical and practical application of a body of specialized knowledge. Continued…

Quote of the Day

“The H-1B program is a good way of bringing talent into the United States. It gives an opportunity to those from other countries to come to the United States and contribute to the growth of our economy.” – John Moore

Learning Center
Employers pull back on hiring of tech talent for H-1B jobs
Hiring for H-1B jobs in tech is slowed by uncertainty over the visa program for skilled foreign workers, with the administration trying to tighten the program.

Trump’s order on H-1B program puts tech employers on notice
The long-awaited executive order on the H-1B program was issued this week. Take heed, experts said.

Automation vs. the H-1B visa program: Which matters to employees?
The H-1B visa program may face sweeping changes, or even elimination. But industry changes already underway, like automation, may lessen the impact.

Healthcare software developer jobs may be hit by Trump H-1B visa move
EHR vendors could be forced to pay more for healthcare software developer jobs in a Trump plan to reform the H-1B visa program for skilled guest workers.

Citrix CEO talks H-1B visas, other Trump proposals
Citrix CEO Kirill Tatarinov explains why technology companies are on the edge of their seats when it comes to potential changes to immigration and healthcare law.

Trending Terms
SKIL bill
outsourcing
labor arbitrage
human capital management
talent management software
recruiter

Quiz Yourself
This is an integrated set of software applications that human resource management (HR) professionals use to hire and retain employees.
A. talent management software
B. performance management software
Answer


August 22, 2017  8:04 PM

industrial control system (ICS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Operational technology, SCADA, Targeted Attacks

Industrial control system (ICS) is a general term used to describe the integration of hardware and software with network connectivity in order to support critical infrastructure. Continued…

Quote of the Day

“Today, it is commonplace to find engineering workstations and servers on the ICS networks using Windows operating systems. These systems are susceptible to WannaCry and other attacks on the Wintel operating systems.” – Ernie Hayden

Learning Center
How does CrashOverride malware threaten industrial control systems?
CrashOverride malware shut down parts of Ukraine’s power grid, and it could threaten other industrial control systems. Here’s what to do about it.

Industroyer malware a turning point for ICS security
Security researchers at Black Hat 2017 tackle the Industroyer malware and the threats to energy grids and ICS security.

How WannaCry malware affects enterprises’ ICS networks
WannaCry malware can be a problem for enterprises’ ICS networks. Here’s a look at why, and what can be done to protect ICS from the ransomware.

A look at the development of an ICS security framework
The ICS security framework development was influenced by other cybersecurity frameworks. Expert Ernie Hayden gives an inside look to the industrial control systems process.

Industrial control systems a growing target for cyber attack
Attackers with increasing capabilities have strong financial motivation to go after critical infrastructure and manufacturing firms, says security industry expert.

Trending Terms
SCADA
ICS security
operational technology
programmed logic controller
IT/OT convergence
targeted attack
air gapping

Quiz Yourself
This category of hardware and software monitors and controls how physical devices perform.
a. operational technology (OT)
b. information technology (IT)
Answer


August 21, 2017  7:49 PM

Eclipse

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Eclipse, Java, Open source

Eclipse is a free, Java-based development platform known for its plug-ins that allow developers to develop and test code written in other programming languages. Eclipse is released under terms of the Eclipse Public License. Continued…

Quote of the Day

“Open source is becoming more accessible because enterprises have seen a number of their peers use it and the sky didn’t fall in.” – Van Lindberg

Learning Center
Oracle opens Java EE, any takers?
The IT industry is discussing where EE might find its next home and bets are split between the Linux Foundation, the Apache Foundation or the Eclipse Foundation.

How to choose cross-platform app development tools
Cross-platform app development tools provide the ability to create apps that can be delivered quickly to many platforms. Learn how this approach can benefit your company.

Open source philosophy goes well beyond software — and into our lives
The open source philosophy is spreading beyond the world of software. Open source advocates at the 2017 Red Hat Summit explained how.

The future of Java promises a cleaner, more readable syntax
Is Java too verbose? Many tend to think so, which is why Oracle’s Java architects are helping to make the syntax of Java more concise in the future.

Open source no longer scares the enterprise
Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door.

Trending Terms
open source
integrated development environment
Java
Apache
Visual Studio Express
Java EE

Quiz Yourself
This fundamental component of a computer program can be read and easily understood by a human being.
a. source code
b. object code
Answer


August 18, 2017  6:24 PM

Microsoft Windows Defender

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Antimalware, Windows Defender

Windows Defender is Microsoft’s antimalware software. Defender works with Windows Update to automatically install new virus definition files as they are published and provide computers using the Microsoft operating system (OS) with both real-time and anytime scanning options. Continued…

Quote of the Day

“Regardless of whether you use Windows Defender or something else, having antimalware tools in place isn’t enough. You must make sure your defenses actually work.” – Brien Posey

Learning Center
Microsoft antivirus policy changes under Kaspersky pressure
Microsoft antivirus policy changes for Windows 10 Fall Creators Update to get Kaspersky to drop an European antitrust case.

Windows Defender bug could allow full-system takeover
Google’s Project Zero found another dangerous, remotely exploitable Windows Defender bug that Microsoft rushed to patch. Here’s what you need to know about it.

How to create an ideal Windows 10 security setup
To create an effective Windows 10 security setup, IT admins have to look at encryption, password complexity, data loss prevention and more.

Apparent Win10 Defender Update Issues Illusory
Recent cumulative updates have led to reports of Windows Defender update errors. Fortunately, these apparent Win10 Defender Update issues are illusory.

Protect against malware Microsoft Windows Defender
Microsoft Windows Defender, installed by default in Windows Server 2016, protects against known malware, a step towards automatic Windows Server hardening.

Trending Terms
anti-spyware software
antimalware
Microsoft Security Essentials
ransomware
Trojan horse
Microsoft Windows Server Antimalware

Quiz Yourself
This is a malicious code that is used by cybercriminals to launch data kidnapping and lockscreen attacks.
a. ransomware
b. Trojan horse
Answer


August 17, 2017  7:17 PM

CAPTCHA

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
image captcha

A CAPTCHA is a type of challenge-response system designed to differentiate humans from robotic software programs. Continued…

Quote of the Day

“CAPTCHA challenge tests include image and text challenges, as well as an audio test option to ensure that users with visual impairments can respond.” – Michael Cobb

Learning Center
How can Google’s CAPTCHA challenge be bypassed using Google tools?
Researchers managed to bypass Google’s CAPTCHA challenge by exploiting flaws in Google web-based tools. Find out what flaws enable this attack.

Identifying and addressing overlooked web security vulnerabilities
Critical web security vulnerabilities can be resolved with proper tools, scanning and tests. Find out how to identify the top overlooked issues.

Machine versus the bots: Does your website pass the Turing 2.0 test?
Robert Richardson questions whether computers can detect the bots vs. real users, as security tools use browser behavior and polymorphism to protect against data theft and fraud.

Bot versus bot – AI: A brief history of man versus machine intelligence
We are making great strides in enabling computers to perceive things. We can now build amazing applications that can mimic humans

CAPTCHA-bypassing malware on Android apps found in Google Play Store
Researchers found sophisticated CAPTCHA-bypassing malware on Android apps in the official Google Play Store.

Trending Terms
challenge-response system
Turing Test
image recognition
software robot
alphanumeric
graphical password

Quiz Yourself
A __________ is a list of domain names from which an e-mail blocking program will allow messages to be received.
a. blacklist
b. whitelist
Answer


August 14, 2017  6:18 PM

superposition

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Quantum theory

Superposition is the ability of a quantum system to be in multiple states at the same time until it is measured. Continued…

Quote of the Day

“Full-blown quantum computing systems won’t be operational for several years, but opening it up to corporate developers will get IT shops thinking about what the technology can do.” – Dave Turek

Learning Center
Can IBM fast-track quantum computing via the crowd?
IBM hails its new cloud-enabled quantum computing service as the birth of the quantum age of computing. Also in Searchlight: Facebook rewards 10-year-old for ethical hacking.

Atos targets universities and research centres with quantum computing simulator
Atos has made a quantum computing simulator available for sale so that organisations can test out the algorithms of the future.

IBM Quantum Computing project: reaching a super position on superposition
A universal quantum computer uses quantum mechanics to process massive amounts of data and perform computations in powerful new ways not possible with today’s conventional computers.

D-Wave builds open quantum computing software development ecosystem
D-Wave Systems has released an open source quantum computing chunk of software.

One quantum leap for IBM, one small step for IT
Big Blue has served up an appetizer of its quantum computing efforts, to give the IT world its first taste of what possibilities the emerging technology might offer.

Trending Terms
quantum theory
Schrodinger’s cat
quantum computing
entanglement
quantum interference
double-slit experiment
qubit

Writing for Business
Wave-particle duality is a fundamental __________ of quantum theory.
a. principle
b. principal
Answer


August 11, 2017  5:34 PM

CompTIA

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
CompTIA

CompTIA is a non-profit trade association known for its IT certification exams and test preparation courses. Continued…

Quote of the Day

“Private equity firms and other people are more likely to provide capital today to companies that have good diversity numbers.” – Todd Thibodeaux, CompTIA CEO

Learning Center
CompTIA: How to tap into the benefits of diversity
CompTIA took channel executives to task for the lack of diversity in the tech industry, stating the benefits of diversity were too large to ignore.

What are the best ways to prep for CompTIA exams?
CompTIA exams can stump IT pros without the right preparation, practice and patience. Follow these tips to pass the test, and plan your certification path.

CompTIA AITP to support IT pros along their ‘resume-to-retirement’ journey
CompTIA is launching its first IT professional organization — CompTIA AITP — this spring. CompTIA has acquired AITP as part of the initiative.

Vendor-neutral certification guide for infosec professionals
Expert Ed Tittel offers a vendor-neutral certification primer for infosec professionals seeking to boost their career paths.

IT industry certifications boost morale, grow partner revenue
IT industry certifications can help prospective employees stand out from the crowd and enable channel partners to create a positive work environment.

Trending Terms
CompTIA practice test
A+
CompTIA Cloud Essentials
system administrator
data center administrator
ISC2

Writing for Business
Certifications and degrees are great, but you need to have excellent communication skills to be successful in your IT career change. This includes being able to write _____.
a. well
b. good
Answer


August 10, 2017  4:22 PM

engine

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
engine, Search engines

In computer programming, an engine is a program that performs a core or essential function for other programs. Continued…

Quote of the Day

“Personalization engines represent a new class of software that bundles capabilities for sorting, selecting and targeting content delivery based on knowledge of the intended audience.” – Geoffrey Bock

Learning Center
A personalization engine comparison: Acquia, Evergage, and Google
Find out whether Acquia Lift, Evergage or Google Optimize fit your personalization engine needs by checking out our helpful comparison.

Online music startup picks a recommendation engine
Neil Young’s PonoMusic opted for Datameer platform software to field a site recommendation engine. The goal: Give users the feel of a vinyl store of yore.

How to use Shodan search engine to diagnose vulnerabilities
Learn how to use the Shodan search engine, which makes computers and associated systems searchable, to become a valuable tool in finding vulnerabilities.

Four essential characteristics of a cloud-based IoT monetization engine
Identifying and defining key characteristics of a cloud-based IoT monetization engine will help businesses succeed not just today, but for years to come.

Business rules engines make workflows more business-friendly but add complexity
A business rules engine and can simplify the process of changing business rules in your application architecture. But some users are better off without one. Find out why in this article.

Trending Terms
recommendation engine
correlation engine
search engine
business rules engine
policy engine
algorithm
Difference Engine

Writing for Business
A business rules engine allows users to specify logic to a computer, _________________.
a. which will then be executed
b. which will then execute it
Answer


August 9, 2017  4:20 PM

managed service provider (MSP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A managed service provider (MSP) is a company that remotely manages a customer’s IT infrastructure and/or end-user systems, typically on a proactive basis and under a subscription model. Continued…

Quote of the Day

“For MSPs to continue to be relevant, they need to be finding ways to evolve their business. What they need are tools that are going to allow them to serve that need to be not only an IT consultant, but a security consultant at the same time.” – Sean Sykes

Learning Center
How can MSPs evolve into cybersecurity companies?
Managed services providers at ChannelCon 2017 described their journeys of transitioning into cybersecurity companies.

MSP documentation: Why it’s essential to scaling your business
Implementing MSP documentation practices will result in efficiency gains and enable companies to scale better than they could before.

AWS Managed Services adds competition to MSP market
AWS Managed Services competes with independent managed service providers. And while the services ease cloud deployments, learning and price barriers exist.

MSP marketing: Learn the fishing and farming methods
At the MSPWorld 2017 conference, Angela Leavitt of Mojo Marketing outlined two methods that can provide the frameworks for MSP marketing initiatives.

How to create a cybersecurity program for your own MSP
For MSPs, developing and maintaining an in-house cybersecurity program is the first step toward launching an IT security practice.

Trending Terms
MSP platform
managed IT service
channel partner
MSSP
VAR

Writing for Business
In information technology, an ___________ specifies the overall structure, logical components, and the logical interrelationships of an information system.
a. architecture
b. infrastructure
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: