“The ability to remotely wipe any managed device is a staple of many enterprise mobile security policies, and it’s vital to preventing sensitive corporate data from being compromised.” — Lisa Phifer
Today’s WhatIs.com Word of the Day is enterprise wipe, a security feature offered by many mobile device management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM.
“There are two main types of buffer overflow attacks: stack based and heap based. Heap-based attacks flood the memory space reserved for a program, but the difficulty involved with performing such an attack makes them rare. Stack-based buffer overflows are by far the most common.” — Brien Posey
Today’s WhatIs.com Word of the Day is stack overflow, an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In programming, the call stack is a buffer that stores requests that need to be handled.
“Users of Apple’s mobile devices are generally less likely to want to jailbreak their devices because they want to be able to update to the latest authorized OS version and take advantage of new features.” — John Girard
Today’s Whatis.com Word of the Day is jailbreaking, the removal of manufacturer or carrier restrictions from a device.
“A new generation of remote display protocols, including Microsoft RemoteFX, Citrix HDX and VMware PC over IP, is capable of providing a PC-like experience over the wire. Still, these protocols may run into trouble when delivering rich media to virtual desktops.” — Mike Laverick
Today’s WhatIs.com Word of the Day is remote display protocol, a special set of data transfer rules that makes it possible for a desktop hosted at one place to display on a client’s screen at another location.
Take a quiz and test your knowledge about remote display protocols!
“SQL may have taken a punch or two in 2012, but it refused to go down for the count. Companies specializing in the alternative NoSQL and Hadoop side of things brushed up their SQL credentials this year.” — Jack Vaughan
Today’s WhatIs.com Word of the Day is Hadoop, an open source framework that supports large data sets in a distributed computing environment.
As 2013 approaches, Jack says there’s a distinct possibility that big data may move from hot topic to practical reality. The reasons why? A big push behind data-driven decision making (intuition and common sense are out — data is in) and an improved understanding that NoSQL does not prohibit structured query language (SQL).
“DLP is just a tool; it just tells you where your areas of risks are,” he said. “The real win, in my opinion, is the opportunity it creates to bring awareness and training to your users.” — Charles Lee
Today’s WhatIs.com Word of the Day is data loss prevention. It’s describes a set of tools that will help monitor data transmissions and prevent end users from sending sensitive or critical information outside the corporate network.
“A common use case for VSAs is in small and medium-sized businesses (SMBs) where shared storage hasn’t been implemented. In these scenarios, virtual storage appliances consolidate direct-attached capacity on each physical host and create a virtual storage pool that looks like networked storage.” — Eric Slack
“Microsoft’s Windows Storage Server 2012 packs in more enterprise-grade features than prior editions, but the recently released software likely will continue to find its sweetest spot with small- to mid-sized businesses and departments of large companies.” — Carol Sliwa
Today’s WhatIs.com Word of the Day is Windows Storage Server 2012.
Windows Storage Server 2012 supports iSCSI and network-attached storage (NAS) for block and file storage. It has built-in storage management features such as data deduplication, thin provisioning and snapshots.
“Understanding how to abstract and represent abstraction is probably the biggest challenge in big data visualization.” — Irene Greif
Today’s WhatIs.com Word of the Day is scatter plot. Scatter plots are important in statistics because they can show the extent of correlation, if any, between variables. If no correlation exists between the variables, the points appear randomly scattered. If a small amount of correlation exists, the points tend to fall near a line or curve. If a large correlation exists, the points concentrate near a straight line.
“There is no magical wand to tap over your IT department, or magic crypto fairy dust that will solve the problem of security. Sandboxing is another weapon in our security arsenal, and IT will take all the weapons it can get.” — Gary McGraw
Today’s WhatIs.com Word of the Day is application sandboxing, an approach to software development and mobile application management (MAM) that limits the environments in which certain code can execute.