Word of the Day: Tech Definitions from WhatIs.com

August 14, 2018  4:56 PM

NVMe over Fabrics (NVMe-oF)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

NVMe over Fabrics (NVMe-oF) is a technology specification designed to enable nonvolatile memory express message-based commands to transfer data between a host computer and a target solid-state storage device or system over a network, such as Ethernet, Fibre Channel (FC) or InfiniBand. Continued…

Quote of the Day

“NVMe-oF is an excellent choice where storage and compute power are strictly separated, such as IoT environments.” – Sander van Vugt

Learning Center
NVMe-oF and its many benefits take NVMe to the next level
NVMe-oF capitalizes on NVMe, providing a common architecture that supports a range of storage network fabrics and scales out to multiple devices over greater distances.

Five NVMe-oF questions you’ve been dying to ask
What is NVMe-oF and why should you care? Here are five frequently asked questions about the innovative technology and what it means for the future of data storage.

NVMe-oF and storage class memory set to disrupt storage
Storage class memory and NVM Express over Fabrics, or NVMe-oF, technologies prove innovation is alive and well in the storage industry.

NVMe technology is but a first step toward bigger things
NVMe technology is leading the way to storage-class memory and other, more significant advances in storage. Get ready for it to play an important role in your storage strategy.

How NVMe over Fabrics will change the storage environment
NVMe over Fabrics for high-end networking and the NVMe protocol replacing SCSI and SAS connectivity will each find a place in the data center.

Trending Terms
solid-state drive
NVMe over FC
direct-attached storage

Quiz Yourself
Servers equipped with flash storage are increasingly common and can _________ reduce latency.
A. farther
B. further

August 13, 2018  4:52 PM

NAND flash memory

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

NAND flash memory is a type of nonvolatile storage technology that does not require power to retain data. Continued…

Quote of the Day

“The population of users who need 3D NAND flash chips on their computers is limited to those who run extremely large workloads, such as big applications or multiple virtual machines.” – Brien Posey

Learning Center
NAND flash shortage end could lead to dramatic price drop
NAND flash shortage is on the verge of ending after two years. Chip prices could drop significantly, semiconductor analyst Jim Handy predicted at Flash Memory Summit.

Key factors that affect NAND flash memory endurance
Several factors can shorten NAND flash memory durability, including some measures that vendors take to improve the life of their drives.

3D NAND technology: What it is and where it’s headed
The durability and cost effectiveness of 3D NAND technology makes it a compelling option in the flash memory market. Now that the NAND shortage is over, how will the tech develop?

Intel, Micron end 3D XPoint memory joint development
Intel and Micron plan to cease their joint development of ultrafast 3D XPoint memory technology in 2019, once they complete work on the second generation of their high-performance technology.

The ultimate guide to NAND flash technology
It’s important for IT buyers and administrators to understand NAND flash technology. Layers, bits per cell and durability are all concerns.

Trending Terms
non-volatile storage
NAND flash wear-out
NOR flash memory
logic gate
3D NAND flash
SSD write cycle

Quiz Yourself
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic

August 10, 2018  4:49 PM

open API (public API)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An open API, also known as a public API, is an application programming interface that allows the owner of a network-accessible service to give universal access to consumers of that service, such as developers. Continued…

Quote of the Day

“Open APIs enable IT to provide users data regardless of location — and in the user interface in which they are accustomed to working.” – Laurence Hart

Learning Center
How API-based integration dissolves SaaS connectivity limits
Oracle’s Vikas Anand discussed how API-based integration can help DevOps teams bypass limitations in SaaS integration and common integration challenges that plague hybrid IT environments.

Manage APIs with connectivity-led strategy to cure data access woes
Traditional IT created data silos that cause data access and delivery problems today. MuleSoft founder Ross Mason explains how to manage APIs with a connectivity-led strategy to achieve real-time data access and how APIs speed the adoption of new technologies, such as AI and FaaS.

Healthcare APIs weave into common lingo of federal officials
Healthcare APIs have captured the attention of federal health officials. The administrator of CMS, the head of ONC and the CTO of HealthCare.gov have all talked about the importance of application programming interfaces.

API management platform trends to watch in 2018
In 2018, API management platform maturation and the convergence with iPaaS will help improve business integration and API lifecycle management.

Select the best container monitoring tools for your environment
Different kinds of container monitoring tools track a wide range of data that keeps applications, networks and servers running as they should.

Trending Terms
ODMAAPI management
open source

Quiz Yourself
Open source describes any software whose source code is in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license

August 9, 2018  10:34 PM

AWS CloudTrail

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

AWS CloudTrail is an application program interface (API) call-recording and log-monitoring Web service offered by Amazon Web Services (AWS). Continued…

Quote of the Day

“AWS CloudTrail logs all API calls, which means it generates a lot of data, but digging for useful data among all the logs takes some work.” – Brian Tarbox

Learning Center
Key considerations when buying AWS cost management tools
Keep expenses under control in a multi-cloud AWS infrastructure with third-party AWS cost management tools and the usage reports, cost reports, platform support, optimization and security features that they offer.

Five AWS IAM best practices to bolster cloud security
AWS IAM best practices are a key part of any secure cloud deployment. Admins, for example, need to ensure they carefully create and manage user access policies and roles, and enlist other native and third-party security tools, as needed, to fortify their resources.

Considering cloud threat intelligence and detection services
Cloud threat intelligence services can help enterprises detect and prevent threats to their systems. Here’s a look at some of the available options for a cloud threat detection service.

Parsing AWS CloudTrail logs for useful information
AWS CloudTrail has a log all or nothing approach, which means it generates a lot of data. Finding the CloudTrail logs that are most meaningful to your enterprise can be difficult.

Tracking user activity with AWS CloudTrail
AWS CloudTrail is a Web service that keeps track of AWS API calls. Learn to turn on AWS CloudTrail and to find and read log files.

Trending Terms
Amazon Web Services
Amazon S3
AWS Directory Service

Quiz Yourself
The AWS portfolio ______ more than 100 services, including those for compute, databases, infrastructure management, application development and security.
a. comprises
b. composes

August 8, 2018  10:30 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A RESTful API is an application program interface (API) that uses HTTP requests to GET, PUT, POST and DELETE data. Continued…

Quote of the Day

“With REST APIs, you can integrate storage management with your own scripts, which makes IT more flexible and programmable.” – Gábor Nyers

Learning Center
How to use REST APIs in Python
It’s important for storage administrators who are after open management to know a little bit about using REST APIs in Python.

What the future of RESTful API design holds for developers
What does the future hold for RESTful API design? Is it winning over the old SOA crowd? Tom Nolle discusses what developers and architects can expect.

How the Docker REST API can be turned against enterprises
A Docker REST API can be abused by attackers to escalate privileges and remote execute code. Find out about the dangers of Docker APIs.

When data APIs go neglected, business intelligence suffers
In 2018, management of data APIs must improve to help BI and analytics teams access data and handle data silos more effectively.

GraphQL vs. REST: Nailing down the pros and cons of each
This article explores the considerations developers should take when deciding between GraphQL vs. REST, including data structure and management needs.

Trending Terms

Quiz Yourself
We use Amazon S3 to ________ local storage.
A. complement
B. supplement

August 7, 2018  10:16 PM

API economy

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

API economy is the exposure of an organization’s digital services and assets through application programming interfaces (APIs) in a controlled way. Continued…

Quote of the Day

“Even enterprises that recognize the value of APIs often treat them as an afterthought on a project list rather than a core feature.” – Chris McNabb

Learning Center
Connecting applications in the API economy
MuleSoft’s Ross Mason discusses how the API economy is becoming the new normal and why APIs are essential for connecting apps.

What CIOs, developers should know about the ‘API economy’
‘API economy’ is a catchphrase fueled by evidence that APIs are a rapidly expanding economic force.

Strong API strategy matters in growing API economy
As API technology advances and the API economy grows in importance, IT must implement a strong API strategy to ensure adequate multiple version control.

API management for microservices: Why it matters and how to do it
This tip takes an in-depth look at the challenges that API management for microservices can bring and how they can be best overcome.

Why use new lifecycle tools in API management platforms?
Having trouble with API quality assurance, versioning and retirement? Take a look at API management platforms that assist with lifecycle control.

Trending Terms
open API
API management
API gateway
cloud storage API
API management platform

Quiz Yourself
In a lifecycle-focused API management platform, specific types of software manage each stage of the _____ lifecycle.
B. API’s

August 6, 2018  9:56 PM

API gateway

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An API gateway is programming that sits in front of an application programming interface (API) and acts as a single point of entry for a defined group of microservices. Continued…

Quote of the Day

“Overall, a strong API strategy allows software development to move faster, because you don’t build from the ground up each time.” – Ross Mason

Learning Center
Manage APIs with connectivity-led strategy to cure data access woes
Traditional IT created data silos that cause data access and delivery problems today. MuleSoft founder Ross Mason explains how to manage APIs with a connectivity-led strategy to achieve real-time data access and how APIs speed the adoption of new technologies, such as AI and FaaS.

Healthcare APIs get a new trial run for Medicare claims
In another move toward interoperability, Blue Button 2.0 is the latest in a series of healthcare APIs to try to standardize data delivery to patients and others. Here’s why 500 developers are giving the Medicare claims API a look.

How to combine API and microservices management
This article takes a critical look at how microservices management and API management can be combined to achieve the best of both.

Why use new lifecycle tools in API management platforms?
Having trouble with API quality assurance, versioning and retirement? Take a look at API management platforms that assist with lifecycle control.

A roundup of the top API management tools available today
Choosing the right API management tools for your needs may seem like a daunting task. Use this product roundup to point you in the right direction.

Trending Terms
API management
Amazon API Gateway
cloud storage API
AWS Lambda

Quiz Yourself
If you’re not _______ well-versed in microservices and containers, you’re running at the back of the pack.
A. already
B. all ready

August 3, 2018  9:52 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A malvertisement (malicious advertisement) is an advertisement on the Internet that is capable of infecting the viewer’s computer with malware. Continued…

Quote of the Day

“To reduce the risk of malvertising attacks affecting the enterprise, security teams should follow general endpoint antimalware advice such as keeping up to date with patches, not running as an admin and so on.” – Nick Lewis

Learning Center
Malvertising campaign tied to legitimate online ad companies
Several online advertising companies were implicated in a Check Point Research report on an extensive malvertising campaign that involved more than 10,000 compromised WordPress sites.

How does the Stegano exploit kit use malvertising to spread?
The Stegano exploit kit is being spread through a malvertising campaign found on major websites. Find out how organizations can prevent malvertising.

Healthcare breaches drop, but ransomware attacks rise
Healthcare breaches of patient data dropped in 2017, but ransomware incidents increased, and the insider threat remained strong.

New cloud threats as attackers embrace the power of cloud
Here’s a look at the top cloud threats in 2018 and some guidelines for protecting platforms and infrastructure in public clouds.

Android vulnerability: How can users mitigate Janus malware?
Android recently disclosed a new Android vulnerability — dubbed Janus — that injects malicious code into reputable apps and infects systems. Discover how this vulnerability works with expert Nick Lewis.

Trending Terms
identity theft

Quiz Yourself
The CEO thought everyone could ______ easily once the antivirus software was updated but unfortunately the company wasn’t protected against social engineering tactics.
a. breath
b. breathe

August 2, 2018  9:30 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Zero-day is a flaw in software, hardware or firmware that is unknown to the party responsible for patching or otherwise fixing the flaw. Continued…

Quote of the Day

“Zero-day vulnerabilities are presumably unknown by the software creator, so there is no way to patch the software to defend against the vulnerability.” – Russ White

Learning Center
New Walmart CISO discusses protecting the world’s largest retailer
In part two of a wide-ranging interview, Walmart CISO Jerry Geisler, who stepped into the role in January, talks about evaluating the Fortune 1 retailer’s security posture, ‘three big buckets’ the company is focused on right now and advances in its cloud strategy.

Zero-day Telegram vulnerability exploited for cryptomining
A zero-day Telegram vulnerability discovered by Kaspersky Lab was used by Russian cybercriminals to spread cryptomining malware.

Microsoft patches Internet Explorer zero-day ‘Double Kill’
For May 2018’s Patch Tuesday, Microsoft fixed an Internet Explorer zero-day vulnerability that was actively exploited in the wild by an advanced persistent threat group.

Understanding the exploit market: How data breaches happen
Quickly upgrading software with the latest patches is essential when you understand how data breaches happen and how the exploit market can work against you when you have network and system vulnerabilities. Our expert walks you through how attackers take advantages of vulnerabilities.

Adobe zero-day fix precedes June Patch Tuesday
An Adobe zero-day exploit stole the attention of administrators before Microsoft addressed about 50 security updates this June Patch Tuesday. Find out which vulnerabilities to prioritize this month and how to address the updated advisory for the Spectre vulnerability.

Trending Terms
advanced persistent threat
vulnerability scanner
Google Project Zero
Patch Tuesday

Quiz Yourself
Ransomware hasn’t been in the news for _______ but it seems to be making a comeback.
a. a while
b. awhile

August 1, 2018  10:01 PM

spear phishing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Continued…

Quote of the Day

“The best way for IT to improve email phishing security is through comprehensive testing, which helps identify which users are susceptible and what type of fake email is most effective.” – Kevin Beaver

Learning Center
LifeLock vulnerability exposed user email addresses to public
A LifeLock vulnerability exposed millions of customers’ email address to anyone with a web browser, according to a report from Brian Krebs, and it jeopardized anyone using the identity theft protection service.

Physical security keys eliminate phishing at Google
Following a requirement for Google employees to use physical security keys, successful phishing attempts were completely eliminated, at least in part, because of the ease of U2F.

Russian intelligence officers indicted for DNC hack
As part of special counsel Robert Mueller’s investigation into Russian interference with the 2016 presidential campaign, a grand jury indicted 12 members of Russia’s GRU for the DNC hack, as well as other malicious activity.

Phishing threats still dwarf vulnerabilities, zero-days
Email security vendor Proofpoint released its Human Factor 2018 report, which details how phishing threats are evolving and still beating enterprise defenses.

Seven factors that make up an effective email phishing test
An effective phishing test should feature emails that include typical phishing indicators, such as misspelled company names. IT pros must have the support of management to effectively run a test, and they should include everyone in the company.

Trending Terms
Trojan horse
social engineering

Quiz Yourself
Exploit kits allow non-technical threat actors to do ____ of damage.
A. a lot
B. alot

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: