Word of the Day: Tech Definitions from WhatIs.com


May 21, 2018  2:37 AM

serverless computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services. Continued…

Quote of the Day

“If executed correctly, a serverless architecture can save development teams time when pushing out new features and can scale nearly infinitely.” – Chris Moyer

Learning Center
IT pros test out fresh crop of serverless monitoring tools
Serverless monitoring tools have quickly added sophisticated features, but a view of the serverless infrastructure that includes distributed tracing and third-party dependencies awaits further development.

The pros and cons of serverless architecture
Serverless architecture can save development teams time when pushing out new features and scaling, but it does not come without trade-offs.

Serverless infrastructure calls for updated IT ops expertise
Enterprises will need IT ops pros with systems engineering expertise to bring serverless infrastructure for complex apps to maturity.

When is serverless technology best for app modernization?
Red Hat serverless technology expert Rich Sharples analyzes why some businesses are exploring serverless use cases for application modernization.

Know when to implement serverless vs. containers
IT pros must be equipped to guide application deployments onto serverless vs. containers, or vice versa, for off-the-shelf apps, in-house projects and microservices.

Trending Terms
event-driven architecture
noops
AWS Lambda
Microsoft Azure Functions
enterprise application integration
cloud services
event handling

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
A. irregardless
B. regardless
Answer

May 17, 2018  5:40 PM

self-service business intelligence (BI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Self-service business intelligence (SSBI) is an approach to data analytics that enables business users to access and work with corporate data even though they do not have a background in statistical analysis, business intelligence (BI) or data mining. Continued…

Quote of the Day

“Whereas guided discovery tools operate with a preset collection of data and metrics, self-service BI tools enable business users to add data and define new metrics when performing analysis without IT intervention.” – Rick Sherman

Learning Center
Seven good data visualization practices for visual integrity
With more users involved in the BI and analytics process, it’s imperative that they follow good data visualization design practices to ensure that the data being presented can be interpreted accurately. These steps can help maintain visual integrity in charts and other infographics.

Self-service BI best practices: 5 dos and don’ts
In this SearchCIO video, Wayfair’s Nathan Kollett enumerates the dos and don’t’s that make up self-service BI best practices.

Get the most out of your data, reap the benefits of BI tools
What do you do with all that enterprise data? Crunch, examine, explore, and contextualize the numbers, and experience the business benefits of BI tools.

New Qlik CEO Mike Capone outlines his business strategy
New Qlik CEO Mike Capone says the company has to tout its success stories more to stay relevant in a competitive self-service analytics market.

Expert: For BI, you must know the data integration process
Cloud, self-service and architecture are the focus as consultant Rick Sherman reviews pressing trends of the day. Top of all is the data integration process.

Trending Terms
statistical analysis
data mining
data mart
embedded BI
data governance
Qlik

Writing for Business
The user-training for the new business intelligence software was extensive, in the hopes that employees would be __________ by the change.
A. unphased
B. unfazed
Answer


May 16, 2018  5:28 PM

Platform as a Service (PaaS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Platform as a service (PaaS) is a cloud computing model in which a third-party provider delivers hardware and software tools — usually those needed for application development — to users over the internet. Continued…

Quote of the Day

“Part of the excitement around platform as a service is that PaaS platforms make it much easier for enterprises to quickly spin up experiments in a safe and secure way.” – George Lawton

Learning Center
Build a culture of innovation on PaaS platforms
PaaS platforms can make it easier for IT teams to spin up experiments, but there are risks to adopting this form of cloud computing, including pushback from corporate IT staff. Tech execs from Deutsche Bank and Experian offered advice at the Red Hat Summit in San Francisco.

Azure IaaS vs. PaaS: Find the right service to reduce costs
This Azure IaaS vs. PaaS comparison gives IT administrators a breakdown of the pros and cons of simply executing a lift and shift into the cloud as opposed to using the PaaS features that might be more cost-effective with better performance.

Test your knowledge of PaaS providers with this brief quiz
As the cloud market continues to grow, it can be tough to keep track of PaaS providers and the various tools they offer. Take this quick quiz to see how much you know about vendors such as AWS, Azure, Google and more.

Deciding between IaaS and PaaS for microservices
Choosing between IaaS and PaaS as the foundation for a move to microservices requires a stable DevOps environment and other considerations.

IaaS and PaaS blurred lines increase lock-in risks
The gap between IaaS and PaaS is disappearing. Emerging technologies, such as containers, blur the distinctions between the service types, which can hide potential risks.

Trending Terms
Software as a Service
Infrastructure as a Service
OpenShift
Microsoft Azure
private PaaS
SPI model

Writing for Business
If you’re not _______ well-versed in microservices and containers, you’re running at the back of the pack.
A. already
B. all ready
Answer


May 15, 2018  5:19 PM

AIOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Artificial intelligence for IT operations (AIOps) is an umbrella term for the use of big data analytics, machine learning (ML) and other artificial intelligence (AI) technologies to automate the identification and resolution of common information technology (IT) issues. Continued…

Quote of the Day

“AIOps can supplant — or at least complement — IT staff members who spend too much time on mundane tasks, such as systems monitoring, alert response, problem diagnosis and course of action determination.” – Muddu Sudhakar

Learning Center
Get started with AIOps tools
AIOps tools find issues in IT environments and help to resolve them — but you do that already. See how the AIOps future is different through the four P’s of how these tools work.

Bots know better: Maybe AIOps tools should drive your stack
AIOps tools promise to help reshape software development and IT operations, but only if we can get beyond our fear of letting a machine make the call.

AIOps tools portend automated infrastructure management
Automated infrastructure management will soon become reality in DevOps shops as IT monitoring tools lay groundwork with new AIOps features.

Enterprise shops look to AIOps for IT root cause analysis
Automated IT root cause analysis to accelerate troubleshooting is the ideal AIOps feature for enterprise ops pros, but skeptics say that’s a pipe dream.

AI’s role in future of DevOps provokes IT industry agita
The future of DevOps will be automated, but how far AIOps can and should go has the IT industry sharply divided as products mature.

Trending Terms
big data analytics
machine learning
data visualization
root cause analysis
causation
DevOps

Writing for Business
Successfully _______ a DevOps culture in a data center isn’t easy, but it brings great rewards.
A. adapting
B. adopting
Answer


May 11, 2018  7:27 PM

conversational user interface

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users. Continued…

Quote of the Day

“Conversational agents have to know how to interact with somebody in order to amplify their thinking. There’s more to it than just what you typically see today as a chatbot.” – Rob High

Learning Center
Tackling the ‘ask me anything’ challenge of a conversational interface
Anticipating everything a user could say in a conversational interface is an impossible task. The solution, IBM researchers said, is to make AI agents state what they’re designed to do upfront and teach people how to better use this new communication channel.

Who’s talking? Conversational agent vs. chatbot vs. virtual assistant
IBM Watson VP and CTO Rob High explains the distinction between a chatbot, a conversational agent and a virtual assistant.

Conversational UX design: What it is and who’s paving the way
Two researchers at IBM explain what conversational UX design is and how their library of sociology-backed conversation patterns is helping advance the field.

Why voice interfaces remain challenging
While voice recognition is much improved and its place in IoT architectures is perceivable, it can still be hard to communicate.

IBM Watson CTO: A range of conversational technologies can coexist
When it comes to conversational technologies like chatbots and smarter AI agents, IBM Watson VP and CTO Rob High said there’s room for both in the enterprise.

Trending Terms
chatbot
call center agent
customer engagement
voice user interface
virtual assistant
natural language

Writing for Business
Our data shows that a vast majority of customers prefer Brand A ____ Brand B.
A. to
B. than
C. over
Answer


May 10, 2018  6:34 PM

Wi-Fi Protected Access (WPA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Wi-Fi Protected Access (WPA) is a security standard for wireless internet connections. It improved upon and replaced the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). Continued…

Quote of the Day

“The most common protocol used to connect IoT devices via Wi-Fi is WPA2 — also known as Wi-Fi Protected Access II — as it defines how a router and Wi-Fi client devices perform the ‘handshake’ network connection process to negotiate the encryption used to secure the connection.” – Michael Cobb

Learning Center
How will the new WPA3 protocol strengthen password security?
The WPA3 protocol aims to better protect the next generation of Wi-Fi-enabled devices. Discover how this new Wi-Fi protocol works and how it’s different from its predecessor, WPA2.

WPA3 Wi-Fi protocol aims to improve security in 2018
The Wi-Fi Alliance announced the finalized WPA3 Wi-Fi protocol standards, which will be put in place in 2018 to improve security.

Battle of the IoT networks: Cellular versus Wi-Fi
Cellular or Wi-Fi. Given each technology’s bandwidth, cost, coverage and security characteristics, which should IoT application developers choose? Sierra Wireless’ Philippe Guillemette discusses.

Wireless security protocols: The difference between WEP, WPA, WPA2
Learn the difference between WEP, WPA and WPA2, and find out which of these wireless security protocols is best for your WLAN.

Why WPA2-PSK can be a security risk even with an uncracked key
WPA2-PSK can be used to improve Wi-Fi security, but it has its flaws. Here’s a look at WPA2 and other Wi-Fi security methodologies.

Trending Terms
WEP
TKIP
802.1X
Extensible Authentication Protocol
RADIUS
hot spot

Writing for Business
Customers began to complain that their Wi-Fi routers were ________ connectivity.
A. losing
B. loosing
Answer


May 9, 2018  7:08 PM

Microsoft Windows Server LTSC

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Microsoft Windows Server LTSC (Long-Term Servicing Channel) is a service option for companies that prefer a traditional release cycle of two to three years between major feature updates. Continued…

Quote of the Day

“Microsoft will release a developer-focused Windows Server version twice a year. Businesses can choose between a traditional release cycle or one that suits continuous deployment.” – Stephen J. Bigelow

Learning Center
Multiple choices complicate Windows Server upgrade process
A Windows Server upgrade means more than just migrating existing workloads to the new operating system. Enterprises can tap into advanced software-defined functionality if they pay a premium for the Datacenter edition, but this choice can also affect a hardware refresh plan.

Revved-up Windows Server release cadence now serves DevOps
Microsoft now offers a Windows Server release every six months for fast-moving businesses. Here’s what admins need to know about the Semi-Annual Channel.

Windows Server pricing muddies purchasing decision process
Windows Server pricing surges with each new release of the server operating system, but the software-defined technologies introduced with each ensuing version can provide savings when looking at the full financial picture.

Get to know your Windows 10 update options
The three Windows 10 update options — Insider Preview, the Semi-Annual Channel and the Long-Term Servicing Channel — handle the process differently.

A Windows Server release built for the DevOps crowd
Microsoft customizes a Windows Server release option for enterprises that want the latest container and cloud features to spur their development efforts.

Trending Terms
Microsoft Windows 10 LTSB
Server Core
GUI
Nano Server
Microsoft Windows Server SAC
Windows as a service

Writing for Business
A large ______ of dependencies in an operating system can make it hard to change one thing without impacting others.
A. amount
B. number
Answer


May 8, 2018  7:04 PM

mobile productivity app

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks. Continued…

Quote of the Day

“Mobile apps make sense for field service workers because they rely on portability and ease of use. These types of employees are rarely in the office, so mobile is often the best way to equip them with the tools they need.” – Harpreet Ahluwalia

Learning Center
Field service mobile apps offer usability, new features
Service companies and mobility have always been a good match, but now field service mobile apps are expanding to include more advanced features such as AR and predictive analytics. Find out how smaller businesses can take advantage of these systems.

AI, security shape mobile app development trends in 2018
Curious about the top mobile app development trends in 2018? Expect artificial intelligence, augmented reality and security to play a big role.

Real-world ways mobile apps boost employee productivity
Mobile applications can be the key to increasing employee productivity, but it’s important for IT to find a way to measure their real-world value for workers.

Pros and cons of AI for mobile IT
Mobile administrators will see the pros and cons of AI in the next few years. Find strategies to take advantage of AI and navigate the problems it may pose.

Four ways to break through mobile business strategy barriers
A mobile business strategy can get organizations’ mobile efforts off the ground while avoiding common roadblocks. Find out four ways to do just that.

Trending Terms
employee productivity
productivity software
MPaaS
device-agnostic
mobile device management
enterprise mobility

Writing for Business
I prefer native apps ___ Web apps because they’re customized for my smartphone.
A. than
B. to
Answer


May 7, 2018  6:39 PM

competitive advantage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals. Continued…

Quote of the Day

“Wasting project team time today is more significant than just a few years ago. In the current digital era, competitive advantage is based on speed.” – Zeus Kerravala

Learning Center
Corporate IT rebrands its modern role: Reduce complexity
The massive amount of data generated by digital technologies has pushed corporate IT into a power position at many enterprises. That has its pluses and minuses, according to panel of IT executives at the Argyle 2018 CIO Leadership Forum.

Dell EMC IT transformation central to 2018 channel strategy
The Dell EMC IT Transformation campaign, launched at the Global Partner Summit, looks to showcase the Dell Technologies portfolio and how partners can modernize IT infrastructure.

For Airbnb, data democratization is a strategic advantage
Despite a general recognition that data has business value, most companies have done little to democratize data. Then there is Airbnb data.

Embrace IT digital transformation and the new tech landscape
It’s time to face IT digital transformation or risk being left behind as IT and revenue become more closely linked together.

Competitive advantages of mobile apps for customers, employees
The advantages of mobile apps for customers include higher revenue, better ad targeting and customer outreach; for employees, it means more efficiency.

Trending Terms
Porter’s Five Forces
SWOT analysis
vertical market
strategic management
core competency
strategic innovation

Writing for Business
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
A. awhile
B. a while
Answer


May 4, 2018  6:24 PM

command and control server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. Continued…

Quote of the Day

“To protect their malicious operations, hackers are constantly looking for techniques to try and obfuscate their C&C infrastructure and to avoid takedowns by making forensic analysis, detection and attribution a lot harder.” – Michael Cobb

Learning Center
AIR-Jumper: How can security camera lights transmit data?
Ben-Gurion University researchers developed aIR-Jumper — an exploit that leverages lights within security cameras. Learn how this targeted attack works.

How are hackers using Twitter as C&C servers for malware?
Hackers are using Twitter instead of C&C servers to spread their malicious Twitoor Android Trojan. Find out how the attack works and how to prevent it.

How can a malicious C&C server remain undetected?
A C&C server used by malware authors can evade detection, but here’s how enterprises can uncover malicious C&C communications.

New cloud threats as attackers embrace the power of cloud
Here’s a look at the top cloud threats in 2018 and some guidelines for protecting platforms and infrastructure in public clouds.

Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the Arachni scanner, and it now works through Telegram after being found on a hacking forum. Nick Lewis explains how this is possible.

Trending Terms
rootkit
ransomware
DDoS attack
botnet
white hat
Trojan horse

Writing for Business
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
A. though
B. although
c. even though
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: