Word of the Day: Tech Definitions from WhatIs.com


October 15, 2018  4:40 PM

PACS

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports. Continued…

Quote of the Day

“With a PACS, a healthcare provider can access patient information or medical images essentially from anywhere in the world and review the most up-to-date scans and reports almost instantly.” – Megan Charles

Learning Center
How hospitals are using the cloud for medical image storage
As the amount of medical imaging data continues to grow, many healthcare organizations are turning to the cloud for their medical image storage needs.

The current state of PACS software and where it goes from here
Many healthcare organizations are still using PACS software for their medical imaging needs. However, the technology is changing due in no small part to the introduction of the cloud as a backup or replacement for on-premises systems.

HPE 3PAR StoreServ all-flash fixes hospital’s image problems
An Illinois health provider won an HPE 3PAR StoreServ 8450 all-flash array as part of a vendor-sponsored contest. The all-flash storage provides a flash cache to load radiology images faster.

A look at the leading medical imaging software on the market
Learn about the leading medical imaging software and how these products help blend old and new tech to promote collaborative healthcare environments.

What makes up a medical imaging system?
Learn about the technology that makes up a medical imaging system and see how it all helps healthcare organizations create, store and share medical images.

Trending Terms
DICOM
electronic health record
radiology information system
vendor neutral archive
personal health record
telepathology

Quiz Yourself
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive
Answer

October 12, 2018  4:33 PM

12 factor app (twelve-factor app)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. Continued…

Quote of the Day

“Any developer building cloud-based applications, most of which run as a service, should familiar with the 12 factors.” – Michael Maximilien

Learning Center
CI/CD workflows, IT roles lead to organizational disharmony
Disparate CI/CD workflows within an organization can make it more difficult to build development stages into a DevOps pipeline, but the biggest barriers to progress are culture challenges, not technological ones.

Developing cloud applications must play by the rules — all 12 of them
Scalability isn’t enough when developing cloud applications. They need to be self-healing, self-restarting and able to recover their last state.

Manage app dependencies carefully for serverless platforms
Challenges with app dependencies on serverless platforms relate to native modules, deployment packages and more. Overcome them with these tips.

Cloud Foundry users grapple with stateful cloud-native apps
Stateful cloud-native apps remain a contradiction in terms, but Cloud Foundry PaaS users envision a future where persistent data services come into the 12-factor fold.

Container backup follows data persistence to these ephemeral apps
Following the addition of data persistence, container backup is the latest enhancement to these ephemeral applications. Container application data must be protected like all other enterprise data.

Trending Terms
native cloud application
microservices
continuous delivery
application platform
continuous integration

Quiz Yourself
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze
Answer


October 11, 2018  4:37 PM

confidentiality, integrity, and availability (CIA triad)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Continued…

Quote of the Day

“Device security should be incorporated into any design, and IoT deployments are not exempt. The general approach is to use the CIA triad: ensure the confidentiality, integrity and availability of the technology.” – Rick Vanover

Learning Center
What tactics can organizations adopt to drive cloud security practices?
In this SearchCIO Ask the Expert, Gartner research director Marco Meinardi highlights cloud security practices that CIOs can implement for effective use of public cloud services.

Now and later with IoT: What to consider regarding cost, reliability and security
While the benefits of IoT are becoming clear for many organizations, considering cost, reliability and security prior to deployment are critical. Veeam’s Rick Vanover discusses.

CISO: Data integrity and confidentiality are ‘pillars’ of cybersecurity
In this Q&A, learn how one cybersecurity industry veteran maintains what she said are the basic, fundamental aspects of information protection: ensuring data integrity and confidentiality.

Get smart with cloud backup security through ‘CIA’
IT will often wonder if backup data is safe in the cloud. Ensure cloud backup security with data confidentiality, integrity and availability.

Gartner Catalyst 2018: A future without data centers?
Advancements in cloud computing has allowed some organizations to move toward shutting down entire data centers. At the Gartner Catalyst 2018 conference in San Diego, Gartner research vice president Douglas Toombs discussed ways to determine which applications are cloud-ready.

Trending Terms
social engineering
counterintelligence
IoT privacy
IoT security
infosec
CISSP

Quiz Yourself
Today’s CISO needs interpersonal skills in order to _________ others in the boardroom to support their cybersecurity vision.
A. convince
B. persuade
Answer


October 10, 2018  8:20 PM

translation lookaside buffer (TLB)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A translation lookaside buffer (TLB) is a memory cache that stores recent translations of virtual memory to physical addresses for faster retrieval. Continued…

Quote of the Day

“TLB-splitting segregates the portion of a computer’s memory where a program stores its data from the portion where it stores its own code’s instructions.” – Michael Cobb

Learning Center
How does TLBleed abuse the Hyper-Threading feature in Intel chips?
TLBleed exploits use Intel’s HTT feature to leak data. Learn how hackers could use this new side-channel attack to obtain sensitive memory information.

TLBleed attack can extract signing keys, but exploit is difficult
Researchers discovered a side-channel attack, named TLBleed, that abuses the Hyper-Threading feature of Intel chips. But Intel said customers should be immune, even without a patch.

Virtualization isn’t perfect, but SLAT minimizes hypervisor overhead
Second Level Address Translation can help reduce hypervisor overhead, but you may need to check for SLAT support on existing systems and enable support in the BIOS.

CPU features you need for virtualization
CPU features are critical to hypervisor performance. Choosing the right hardware can ensure your virtualized workloads run at peak performance.

Can a new encryption trick prevent reverse engineering?
Learn about Hardened Anti-Reverse Engineering System, or HARES, which cannot exactly prevent reverse engineering, but makes it a little tougher for attackers to complete.

Trending Terms
virtual memory
cache thrash
second-level address translation
physical to virtual
hypervisor
cache

Quiz Yourself
There are three major areas of __________ network virtualization, storage virtualization and server virtualization.
a. virtualization;
b. virtualization:
Answer


October 9, 2018  8:17 PM

augmented intelligence

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Augmented intelligence is an alternative conceptualization of artificial intelligence that focuses on AI’s assistive role, emphasizing the fact that it is designed to enhance human intelligence rather than replace it. Continued…

Quote of the Day

“The key factor that makes this intelligence augmented is the ongoing manual intervention which dictates how, if and when a machine reacts.” – Roei Ganzarski

Learning Center
Augmented human intelligence: Using AI to streamline business process
A recent survey found that the impact of AI is amplified when the technology is aimed at making employees better at their jobs. Augmented human intelligence improves business performance by streamlining business processes and targeting tasks that humans struggle with. Find out why here.

Augmented analytics, automated tools facilitate data analysis
With augmented analytics, automated machine learning and other technologies, BI and analytics vendors are increasingly incorporating AI functionality into their software to simplify and speed up the analytics process for users.

Augmented vs. artificial intelligence: What’s the difference?
Artificial intelligence is a hot topic, but as BoldIQ’s Roei Ganzarski notes, true AI doesn’t exist today; what we’re experiencing is augmented intelligence.

Augmented intelligence: The clearest path to focused AI?
Despite an onslaught of investment, artificial intelligence progress has stalled. CIOs should focus their time — and money — on improving augmented intelligence. Here’s some expert advice on the how augmented intelligence is benefitting advancements in AI.

AI in HR: Artificial intelligence to bring out the best in people
Learn about the many applications of AI in HR, including how artificial intelligence machine learning techniques minimize bias in recruiting.

Trending Terms
machine learning
deep learning
IBM Watson
AI
machine-human collaboration
robotic process automation

Quiz Yourself
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
A. except
B. accept
Answer


October 8, 2018  8:14 PM

e-discovery

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Electronic discovery (also called e-discovery or ediscovery) refers to any process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a civil or criminal legal case. Continued…

Quote of the Day

“E-discovery is complex; its proper execution is vital to sustaining the rule of law in the digital age in which we now live.” – Jeffrey Ritter

Learning Center
Survey: Attorneys still lack proficiency in e-discovery technology
The reliance on digital evidence has done little to advance the legal field’s proficiency in e-discovery technology, a survey of federal judges found.

Microsoft Teams e-discovery enabled for hybrid clouds
A new Microsoft Teams e-discovery tool should appeal to large enterprises as they transition to the cloud. The feature is targeted at businesses with on-premises Exchange servers.

Integrating e-discovery process with traditional backup
The e-discovery process for backup data can be a real challenge. Brien Posey outlines how e-discovery and traditional backup software products are becoming more integrated today.

E-discovery tools and processes lacking in the face of cloud, BYOD
Corporate mobile and cloud use are now common, but e-discovery tools are slow to adapt. In this tip, learn how to manage the new e-discovery challenges posted by these technologies.

Information governance strategy and e-discovery are intertwined
Your company’s e-discovery process needs a strong framework for managing information throughout its lifecycle. That’s why information governance matters.

Trending Terms
computer forensics
Microsoft Exchange In-Place eDiscovery
discovery mailbox
technology-assisted review
predictive coding
electronic discovery reference model

Quiz Yourself
According to the fruit of the poisonous tree doctrine, evidence discovered indirectly as a result of an illegal method is not ______________.
a. admissible
b. admissable
Answer


October 5, 2018  8:10 PM

digital accessibility

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Digital accessibility is the ability of a website, mobile application or electronic document to be easily navigated and understood by a wide range of users, including those users who have visual, auditory, motor or cognitive disabilities. Continued…

Quote of the Day

“Whether it’s an indoor navigation system or a well-placed QR code, the ability to apply technology to help improve people’s working lives makes for a satisfying IT role.” – Jason Bailey

Learning Center
Indoor navigation system transforms working conditions for the blind
An indoor navigation system, iPad-based room reservation system and QR codes help blind and visually impaired people find their way through Bosma’s new digs.

Why you need to start thinking about accessibility testing today
The skills involved in accessibility testing are growing in demand. Expert Gerie Owen details what’s involved in making sure everyone can use your application.

Enterprise AR apps call for strong use cases, requirements
Get started with AR apps with these tips on building use cases and requirements. Get ready, because augmented reality tools are ready for enterprises.

How is Android Accessibility Service affected by a banking Trojan?
Android Accessibility Service, Google’s digital accessibility software, was hit by a new malware that uses overlay attack techniques to avoid detection. Learn how this new Android malware — dubbed MysteryBot — affects Google services.

New rules for WCM tools enhance the search experience
Digital experience requires WCM tools that not only render content across all manner of devices, but also find it in videos, voice and images.

Trending Terms
assistive software
assistive technology
Section 508
user experience
speech recognition
text-to-speech

Quiz Yourself
The FDA reclassified sutures as Class II medical devices in the early ______.
A. 1990’s
B. 1990s
Answer


October 3, 2018  8:05 PM

cloud ERP

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Cloud ERP is a type of enterprise resource planning software that is hosted on a third-party cloud computing platform, rather than on premises within an enterprise’s own data center. Continued…

Quote of the Day

“Cloud ERP offers organizations an opportunity to redirect their IT resources elsewhere, so they can add more value to other areas.” – Michael Guay

Learning Center
The benefits and drawbacks of cloud ERP systems for healthcare
Experts weigh in on cloud ERP systems for healthcare. Learn what they have to say on cloud security, electronic health records, integration and other issues.

Resistance to all-in cloud ERP systems is large
The big vendors would like customers to become users of cloud ERP systems. The reality is that on premises-to-cloud migrations are difficult, and some companies don’t want core data in the cloud. Hybrid may be the path of many.

Cloud ERP systems complicate deployment options
Cloud ERP systems may promise easier deployment and management, but organizations need to let business needs — not technology hype cycles — drive the decision whether to embrace the cloud.

How to make the single-tenant vs. multi-tenant cloud ERP choice
For companies moving to cloud ERP, the single-tenant vs. multi-tenant cloud comparison is critical and depends on some key factors. Here’s a look at those factors and how to make the decision.

SaaS ERP systems can include hidden costs
While the cloud is touted as a cheaper, more expedient path to ERP, companies need to prepare for surprises when it comes to integration and customization challenges associated with SaaS ERP systems.

Trending Terms
business process management
SAP S/4HANA Cloud
SaaS ERP
inventory management
Infor
enterprise resource planning

Quiz Yourself
An enterprise needs to have an overall plan to protect PII and secure _________ sensitive data.
A. their
B. its
Answer


October 2, 2018  8:03 PM

actionable intelligence

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Actionable intelligence is information that can be followed up on, with the further implication that a strategic plan should be undertaken to make positive use of the information gathered. Continued…

Quote of the Day

“Advances in predictive analytics can ultimately result in credible predictive models that legitimize actionable intelligence and encourage businesses to make bold and ultimately rewarding decisions.” – Ron Karjian

Learning Center
Automated predictive analytics tools spawn wannabe scientists
They don’t own the same depth of data science skills and knowledge, but with the aid of automated predictive analytics, a new breed of ‘data scientists’ has the capability of building, refining, tuning and rewriting predictive models that provide their company with critical actionable insights.

A CIO forges a data strategy plan for creating actionable data
If you need assistance creating actionable data from the vast amounts of content your organization is gathering, Tammy Bilitzky, the CIO of Data Conversion Laboratory can help you with that.

What mobile device analytics can do for you
Gaining insight into how users work and what they need can improve their work experience dramatically. Learn how mobile device analytics can contribute to this effort.

How can AI in mobile technology improve security?
AI in mobile security systems will ensure IT can better prevent threats. Discover how IT should prepare for these upcoming technologies and how to use them.

How AI and IoT will interact
To create a world of seamless exchange between people, networks, devices and applications, IoT in concert with AI is critical, says Tata Communications’ Tim Sherwood.

Trending Terms
competitive intelligence
actionable
predictive analytics
Splunk
smart machines
intelligent-agent

Quiz Yourself
Business intelligence systems can only work if data _____ throughout the enterprise’s systems.
a. jives
b. jibes
c. gibes
Answer


October 1, 2018  7:59 PM

account-based marketing (ABM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Account-based marketing (ABM) is a business-to-business (B2B) strategy that focuses sales and marketing resources on target accounts within a specific market. Continued…

Quote of the Day

“Marketing focuses all of their resources, budget and campaigns against a very specific list of target accounts to directly support the sales effort.” – Josh Garland

Learning Center
Comparing the top marketing automation software vendors
Navigating through all the marketing automation software vendors can be tricky. Get a breakdown from experts on market leaders like Eloqua, Marketo and Pardot.

This is the year CRM AI remakes sales automation
The hype behind CRM AI for improving sales automation has been very noisy. Next year will be the payoff, as AI-driven processes become part of everyday workflows.

Salesforce enters account-based marketing space with Einstein ABM
Einstein ABM offers insights on data within Salesforce, but third-party data providers are still needed for full scope.

Is account-based marketing right for your company?
If your company has qualifiers, such as a narrow target market, then account-based marketing might work for you. Here’s a close look at eight steps to get it right.

Adobe acquisition of Marketo could shake up industry
An Adobe acquisition could be coming. But while no deal has been confirmed by Adobe or acquisition target Marketo, the potential move could lead to Adobe moving in on the B2B space and, possibly, even Salesforce.

Trending Terms
book of business
marketing automation
content marketing
named account
demand gen
buying signals

Quiz Yourself
I requested copies of the marketing report for other team members and ____.
a. me
b. myself
c. I
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: