Word of the Day: Tech Definitions from WhatIs.com


July 12, 2019  3:48 PM

metadata management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Metadata management is the administration of data that describes other data. Continued…

Quote of the Day

“Big data often comes with big data management problems. Clean, well-defined metadata can make the difference in analyzing big data and delivering actionable business intelligence.” – Scott Robinson

Learning Center
Get to know data governance tools for the enterprise
Data governance tools can help businesses address a number of content management issues. Learn more about some of those platforms and the problems they solve.

IBM Spectrum storage refresh targets object, AI metadata
Discover, part of IBM Spectrum storage software, improves metadata management for AI and big data analytics on large-scale file and object storage. IBM boosted Spectrum data protection and Cloud Object Storage capacity. VersaStack with FlashSystem 9100 NVMe flash is in preview.

Solix archiving takes files, databases, email to the cloud
Solix archiving goes SaaS. Labeled ‘archiving as a service’ by the vendor, SolixCloud Enterprise Archiving offers file, database and email archives in Microsoft Azure.

A strong metadata management process eases big data woes
A well-organized metadata management process can make all the difference in analyzing big data and delivering actionable business intelligence results.

How metadata management relates to data governance and MDM
Without effective metadata management processes, an organization couldn’t have a successful data governance or master data management program, says consultant Anne Marie Smith.

Trending Terms
metadata
document metadata
metadata security
information life cycle management
data catalog
metabase

Quiz Yourself
Although big data is getting bigger all the time, much of the data being collected ___ useless.
a. is
b. are
Answer

July 11, 2019  3:51 PM

VM automation

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

VM automation is the ability for a virtual machine (VM) to perform basic functions and optimize performance on its own or with minimal manual input. Continued…

Quote of the Day

“Admins looking to automate VM tasks should consider whether or not their workloads are large enough to benefit from automation.” – Stefani Muñoz

Learning Center
VM automation strategies and benefits for sizable workloads
VM automation can provide several benefits, such as speed and consistency, but not all workloads are suited for this process. IT administrators must be aware of their own workloads, common mistakes and tools offered before incorporating automation into their environments.

What VM automation tools are available?
Learn about the various types of VM automation tools you can choose from to enable rapid and predictable resource provisioning. Automation is rarely a discrete product, but is part of a larger tool set, so careful evaluation is necessary.

VMware Workstation 15’s built-in REST API eases VM automation
VMware’s Workstation 15 has several new features — notably, a built-in REST API you can use for automation. Easily power machines off and on, and save time using this helpful tool.

What are the most common virtualization automation mistakes?
There are three primary mistakes you might make when implementing virtualization automation. Avoid them by examining your business policy, double-checking VM configuration and accommodating changing business needs.

How can automation help with VM creation and maintenance?
Automation can help ease VM creation and maintenance, allowing administrators to quickly provision and patch large numbers of virtual servers.

Trending Terms
VMware vSphere PowerCLI
VMware vRealize Suite
virtual machine
IT automation
VMware DRS

Quiz Yourself
Application streaming and virtualization can help you _______ greater network efficiency.
a. attain
b. obtain
Answer


July 10, 2019  3:59 PM

business analytics (BA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Business analytics (BA) is the iterative, methodical exploration of an organization’s data, with an emphasis on statistical analysis. Continued…

Quote of the Day

“Companies often report the highest analytics success when blending teams, so data scientists working alongside business analysts can produce operational benefits.” – Ed Burns

Learning Center
Guide to telling stories with data: How to share analytics insights
Using data visualizations to convey information can be a challenge. Learn more about telling stories with data in this guide to effective data storytelling.

Data scientist vs. business analyst: What’s the difference?
Many people confuse data scientists with business analysts, but the roles are distinct. One career expert explains data scientist vs. business analyst roles, how they are similar and where they differ.

The direction of business intelligence is changing to forward
As business intelligence is changing quickly, one of the key trends will be the ability for BI platforms to look forward and be predictive, rather than just detail what has already taken place.

Building leaner, meaner BI data sources
Now that business intelligence has broken free from traditional data warehousing, the data that feeds it has taken center stage. In this tip, get advice for building better BI data sources and getting the most out of BI analysis and reporting.

Make better business decisions with financial analytics
Your organization can take advantage of financial analytics to predict the future, make better business decisions and automate data reporting. Not only that, but by using predictive and advanced analytics tools, you can improve the overall performance of your finance department.

Trending Terms
business intelligence
statistical analysis
predictive analytics
descriptive analytics
prescriptive analytics
data scientist
data artist

Quiz Yourself
The use of a spreadsheet when a data warehouse was required created a situation _______ effective analysis was impossible.
a. where
b. in which
Answer


July 9, 2019  4:02 PM

cloud access security broker (CASB)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud access security broker (CASB) is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure. Continued…

Quote of the Day

“While a cloud access security broker is certainly one of the more useful products available to help achieve a cyber-resilient organization, it’s of limited use without a team capable of understanding these use cases and responding to alerts generated by the system.” – Rob Shapland

Learning Center
Incident response tools: How, when and why to use them
There are several categories of dedicated incident response tools — including vulnerability management, SIEM, network traffic analysis and data loss prevention — that can provide information and analysis and create reports to help organizations prevent and respond appropriately to security attacks.

How cloud access security brokers have evolved
Cloud access security brokers made a big splash when they first entered the industry, but where are they now? Here’s a look at where they stand.

The CASB market is (nearly) gone but not forgotten
A series of acquisitions have drastically reduced the number of stand-alone cloud access security brokers and reshaped the CASB market for years to come.

CASB market poised for channel growth
The CASB market, while nascent, is opening up a significant opportunity for channel firms to address clients’ security concerns.

The pros and cons of proxy-based security in the cloud
Microsoft addressed the issue of proxy-based security for Office 365 and the associated benefits and drawbacks. Learn what Microsoft recommended and why.

Trending Terms
cloud service provider
access control
shadow IT
CipherCloud
cloud encryption
CAIQ

Quiz Yourself
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating
Answer


July 8, 2019  4:04 PM

unified endpoint management (UEM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Unified endpoint management (UEM) is an approach to securing and controlling desktop computers, laptops, smartphones and tablets in a connected, cohesive manner from a single console. Continued…

Quote of the Day

“One effective option for organizations concerned about mobile threats is to combine the best features of UEM and mobile threat defense tools.” – Jack Gold

Learning Center
Go beyond UEM security to prevent mobile attacks
IT pros should look beyond UEM security utilities when they develop a mobile threat prevention strategy. Mobile threat defense tools can add crucial monitoring and threat detection functions to managed mobile devices.

Understand how UEM, EMM and MDM differ from one another
UEM, EMM and MDM tools offer varying levels of control over mobile devices, laptops and PCs. Read on to find out what exactly each type of management tool can do and how the tools differ.

Why UEM could overshadow the EMM market
EMM, MDM, MAM and UEM sound like the ingredients of alphabet soup, but it’s actually the progression of changing products in an ever-evolving competitive landscape. Here, one expert predicts the future of the EMM market.

How to navigate a sea of UEM vendors
UEM has evolved from a variety of products, including MDM and EMM. Discover what this new market has to offer and which UEM vendors are taking the lead.

Explore the features of unified endpoint management
Choosing and managing UEM software can be complicated. It’s important to understand how unified endpoint management can benefit your IT deployment and what features it brings to the table.

Trending Terms
mobile device management
enterprise mobility management
unified network management
EUC platform
digital workspace

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


July 3, 2019  8:12 PM

cloud object storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Cloud object storage is a decentralized approach to storing digital information in a cloud service provider’s data centers. Continued…

Quote of the Day

“Cloud object storage is transitioning from simply a cheap place to store data to include more uses such as governance.” – Archana Venkatraman

Learning Center
Cloud data management finding its place as volumes soar sky high
Cloud data management is a key piece of the storage puzzle, with billions of terabytes on the datasphere horizon. There are a number of uses for cloud, but it’s not the end-all be-all for data.

5 multi-cloud use cases for better storage
The use of multiple clouds for storage has quickly become mainstream. Check out how multi-cloud use cases help with backup, resiliency, compliance, AI and software development.

Nasuni CEO: Enterprises now think ‘cloud first’
Nasuni CEO Paul Flanagan says enterprises are thinking ‘cloud first’ and storing more data in the cloud, but it still represents only a small fraction of their overall capacity.

Elastifile adds automated tiering to cloud object storage
Cloud file system startup Elastifile launched a 3.0 product update that adds automated tiering capabilities to object storage in private and public clouds and eases application access to object data.

Effective data management to combat the coming data apocalypse
Effective data management is key to ensuring your organization’s data is accessible and usable in the future. Our essential guide shows you how data management and storage are evolving to deal with issues surrounding unstructured data, IoT-generated data, cloud storage and tiering.

Trending Terms
network attached storage
storage area network
object ID
cloud storage gateway
cloud storage service

Quiz Yourself
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
A. separate
B. seperate
Answer


March 29, 2019  8:17 PM

endpoint security management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources.

Quote of the Day

“Certain behaviors, such as ignoring patches, create security issues on the endpoints users work with. IT should enforce policies that prevent users from taking these damaging actions.” – Kevin Beaver

Learning Center
NSS Labs CTO discusses advanced endpoint protection testing, challenges
NSS Labs released its 2019 Advanced Endpoint Protection Group Test results this month at RSA Conference. The vendor’s CTO, Jason Brvenik, discusses the results, the challenges in testing the products and how the endpoint protection market is changing.

How EDR tools can improve endpoint security
EDR tools, a relatively new category of proactive endpoint security tools, can help in IT’s fight against malware. Find out if EDR is a good option for your deployment.

Dell unveils endpoint security portfolio with CrowdStrike, Secureworks
Dell announced its partnership with CrowdStrike and Secureworks to launch SafeGuard and Response, an endpoint security portfolio designed to prevent, detect and respond to threats facing enterprises — especially midmarket companies.

How to address endpoint security issues caused by users
There are several common endpoint security issues that users cause, including weak passwords and unsecured network connections. IT should handle these with security policies that address the behaviors directly.

Worries rise about security breaches in healthcare as endpoints expand
In the face of increased security breaches in healthcare, hospitals will grapple with widening endpoint access and related cybersecurity risks.

Trending Terms
client server
endpoint authentication
unified endpoint management
endpoint reference
virtual LAN
endpoint device

Quiz Yourself
People who think mobile security is ______________ could be in for a rude awakening.
a. not that big a deal
b. not that big of a deal
Answer


March 28, 2019  8:15 PM

computational storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Computational storage is an information technology (IT) architecture in which data is processed at the storage device level to reduce the amount of data that has to move between the storage plane and the compute plane.

Quote of the Day

“The ability to provide compute services at the device level was not truly available until the adoption rate of SSDs was in place.” – Scott Shadley

Learning Center
Computational storage takes spotlight in new NGD Systems SSD
Computational storage moved into the spotlight with NGD Systems’ new 16 TB NVMe-based SSD that embeds a quad-core ARM processor into its custom-built 14 nm ASIC to execute applications.

NVMe flash storage is coming to an enterprise near you
In the enterprise, NVMe flash storage tends to exist as clustered server nodes dedicated to an individual application. An industry consortium previews forthcoming standards to advance NVMe over fabrics.

2019 IT focus: Storage architecture for big data analytics
Experts predict 2019 IT focus will turn to storage architecture for big data analytics, artificial intelligence, machine learning and IoT, as organizations try to make better use of the morass of data they’ve collected.

How NVMe technology will rock the enterprise storage boat
NVMe technology changes how storage connects to servers and moves storage closer to the CPU, reducing latency and improving performance. It has great promise, but what challenges will businesses face to adopt the new storage protocol?

Vexata storage gets a boost from Fujitsu deal
Fujitsu will sell Vexata storage arrays. The partnership provides market exposure for Vexata, while the Fujitsu portfolio adds its first NVMe-oF storage.

Trending Terms
real-time analytics
NAND flash memory
SSD
persistent storage
hyperscale computing
multi-core processor

Quiz Yourself
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic
Answer


March 27, 2019  8:04 PM

intent-based networking (IBN)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Intent-based networking (IBN) is a network administration model that uses artificial intelligence (AI), network orchestration and machine learning (ML) to automate administrative tasks across a network.

Quote of the Day

“IBN is about the network having a clear understanding of the purpose, use and importance of all the applications it runs.” – Andrew Froehlich

Learning Center
What is intent-based networking and how does it work?
Intent-based networking has a lot of potential. It also has a lot of hype. Cut through the confusion surrounding intent-based networking with this infographic that illustrates the steps involved.

What is the relationship between intent-based networking and SDN?
What do SDN and intent-based networking have in common? You might have been wondering, so we went ahead and asked for you.

Forward Networks’ software enables intent-based networking
Forward Networks has won TechTarget’s Network Innovation Award in recognition of its assurance and verification platform. Learn more about the company’s intent-based networking software.

Intent-based networking reality check for 2019
In 2019, intent-based networking is more of a futuristic possibility than a tangible reality. But don’t disregard the IBN concept altogether. Instead, take the time to explore the IBN options currently available and learn why enterprises should care.

Intent-based networking vs. SDN: How do they differ?
When comparing intent-based networking vs. SDN, one major difference is how the two technologies use abstraction in their commands. SDN commands remain device-centric, for example, while intent-based networking focuses on business policy.

Trending Terms
network orchestration
AI
software-defined networking (SDN)
Network as a Service
software-defined networking
machine learning

Quiz Yourself
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
a. was
b. were
Answer


March 20, 2019  8:00 PM

video game design

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Video game design is the process of conceiving, planning and directing the creation of an electronic game in which players control images on an electronic display.

Quote of the Day

“Game designers now realize that AI systems that combine the power of machine learning and natural language processing and generation can create content and experiences that are every bit as realistic as those created by their human counterparts.” – Kathleen Walch

Learning Center
The future of IoT in the video game industry
What does IoT have to do with the video game industry? Playgroundz’s Michael Yum outlines IoT’s impact on the gaming industry now and in the future.

Use of AI in video games boosts playing experience
The use of AI in video games continues to grow. Read this article to see how this growing trend contributes to more realistic and engaging playing experiences.

IoT gives the mobile gaming industry a facelift
The mobile gaming industry is getting a makeover thanks to the internet of things. Tatvasoft’s Ritesh Mehta explains how IoT and gaming go hand in hand.

Music composed by AI breathes new life into video games
While video games rely on more and more advanced procedural generation for world building, their soundtracks are generally static. The use of music composed by AI could make soundtracks more dynamic.

Can computer games double as personality assessment tools?
It can be hard for recruiters to determine the reliability of personality assessment tools. Guy Halfteck, CEO of game producer Knack, thinks he has the answer.

Trending Terms
pervasive gaming
cooperative games
role-playing game
game theory
Twitch
augmented reality gaming

Quiz Yourself
Augmented reality seems futuristic but ____ potential has already begun to be realized.
a. its
b. it’s
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: