Word of the Day: Tech Definitions from WhatIs.com


May 11, 2018  7:27 PM

conversational user interface

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A conversational user interface is the ability of artificial intelligence-supported chatbots to have verbal and written interactions with human users. Continued…

Quote of the Day

“Conversational agents have to know how to interact with somebody in order to amplify their thinking. There’s more to it than just what you typically see today as a chatbot.” – Rob High

Learning Center
Tackling the ‘ask me anything’ challenge of a conversational interface
Anticipating everything a user could say in a conversational interface is an impossible task. The solution, IBM researchers said, is to make AI agents state what they’re designed to do upfront and teach people how to better use this new communication channel.

Who’s talking? Conversational agent vs. chatbot vs. virtual assistant
IBM Watson VP and CTO Rob High explains the distinction between a chatbot, a conversational agent and a virtual assistant.

Conversational UX design: What it is and who’s paving the way
Two researchers at IBM explain what conversational UX design is and how their library of sociology-backed conversation patterns is helping advance the field.

Why voice interfaces remain challenging
While voice recognition is much improved and its place in IoT architectures is perceivable, it can still be hard to communicate.

IBM Watson CTO: A range of conversational technologies can coexist
When it comes to conversational technologies like chatbots and smarter AI agents, IBM Watson VP and CTO Rob High said there’s room for both in the enterprise.

Trending Terms
chatbot
call center agent
customer engagement
voice user interface
virtual assistant
natural language

Writing for Business
Our data shows that a vast majority of customers prefer Brand A ____ Brand B.
A. to
B. than
C. over
Answer

May 10, 2018  6:34 PM

Wi-Fi Protected Access (WPA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Wi-Fi Protected Access (WPA) is a security standard for wireless internet connections. It improved upon and replaced the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). Continued…

Quote of the Day

“The most common protocol used to connect IoT devices via Wi-Fi is WPA2 — also known as Wi-Fi Protected Access II — as it defines how a router and Wi-Fi client devices perform the ‘handshake’ network connection process to negotiate the encryption used to secure the connection.” – Michael Cobb

Learning Center
How will the new WPA3 protocol strengthen password security?
The WPA3 protocol aims to better protect the next generation of Wi-Fi-enabled devices. Discover how this new Wi-Fi protocol works and how it’s different from its predecessor, WPA2.

WPA3 Wi-Fi protocol aims to improve security in 2018
The Wi-Fi Alliance announced the finalized WPA3 Wi-Fi protocol standards, which will be put in place in 2018 to improve security.

Battle of the IoT networks: Cellular versus Wi-Fi
Cellular or Wi-Fi. Given each technology’s bandwidth, cost, coverage and security characteristics, which should IoT application developers choose? Sierra Wireless’ Philippe Guillemette discusses.

Wireless security protocols: The difference between WEP, WPA, WPA2
Learn the difference between WEP, WPA and WPA2, and find out which of these wireless security protocols is best for your WLAN.

Why WPA2-PSK can be a security risk even with an uncracked key
WPA2-PSK can be used to improve Wi-Fi security, but it has its flaws. Here’s a look at WPA2 and other Wi-Fi security methodologies.

Trending Terms
WEP
TKIP
802.1X
Extensible Authentication Protocol
RADIUS
hot spot

Writing for Business
Customers began to complain that their Wi-Fi routers were ________ connectivity.
A. losing
B. loosing
Answer


May 9, 2018  7:08 PM

Microsoft Windows Server LTSC

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Microsoft Windows Server LTSC (Long-Term Servicing Channel) is a service option for companies that prefer a traditional release cycle of two to three years between major feature updates. Continued…

Quote of the Day

“Microsoft will release a developer-focused Windows Server version twice a year. Businesses can choose between a traditional release cycle or one that suits continuous deployment.” – Stephen J. Bigelow

Learning Center
Multiple choices complicate Windows Server upgrade process
A Windows Server upgrade means more than just migrating existing workloads to the new operating system. Enterprises can tap into advanced software-defined functionality if they pay a premium for the Datacenter edition, but this choice can also affect a hardware refresh plan.

Revved-up Windows Server release cadence now serves DevOps
Microsoft now offers a Windows Server release every six months for fast-moving businesses. Here’s what admins need to know about the Semi-Annual Channel.

Windows Server pricing muddies purchasing decision process
Windows Server pricing surges with each new release of the server operating system, but the software-defined technologies introduced with each ensuing version can provide savings when looking at the full financial picture.

Get to know your Windows 10 update options
The three Windows 10 update options — Insider Preview, the Semi-Annual Channel and the Long-Term Servicing Channel — handle the process differently.

A Windows Server release built for the DevOps crowd
Microsoft customizes a Windows Server release option for enterprises that want the latest container and cloud features to spur their development efforts.

Trending Terms
Microsoft Windows 10 LTSB
Server Core
GUI
Nano Server
Microsoft Windows Server SAC
Windows as a service

Writing for Business
A large ______ of dependencies in an operating system can make it hard to change one thing without impacting others.
A. amount
B. number
Answer


May 8, 2018  7:04 PM

mobile productivity app

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks. Continued…

Quote of the Day

“Mobile apps make sense for field service workers because they rely on portability and ease of use. These types of employees are rarely in the office, so mobile is often the best way to equip them with the tools they need.” – Harpreet Ahluwalia

Learning Center
Field service mobile apps offer usability, new features
Service companies and mobility have always been a good match, but now field service mobile apps are expanding to include more advanced features such as AR and predictive analytics. Find out how smaller businesses can take advantage of these systems.

AI, security shape mobile app development trends in 2018
Curious about the top mobile app development trends in 2018? Expect artificial intelligence, augmented reality and security to play a big role.

Real-world ways mobile apps boost employee productivity
Mobile applications can be the key to increasing employee productivity, but it’s important for IT to find a way to measure their real-world value for workers.

Pros and cons of AI for mobile IT
Mobile administrators will see the pros and cons of AI in the next few years. Find strategies to take advantage of AI and navigate the problems it may pose.

Four ways to break through mobile business strategy barriers
A mobile business strategy can get organizations’ mobile efforts off the ground while avoiding common roadblocks. Find out four ways to do just that.

Trending Terms
employee productivity
productivity software
MPaaS
device-agnostic
mobile device management
enterprise mobility

Writing for Business
I prefer native apps ___ Web apps because they’re customized for my smartphone.
A. than
B. to
Answer


May 7, 2018  6:39 PM

competitive advantage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals. Continued…

Quote of the Day

“Wasting project team time today is more significant than just a few years ago. In the current digital era, competitive advantage is based on speed.” – Zeus Kerravala

Learning Center
Corporate IT rebrands its modern role: Reduce complexity
The massive amount of data generated by digital technologies has pushed corporate IT into a power position at many enterprises. That has its pluses and minuses, according to panel of IT executives at the Argyle 2018 CIO Leadership Forum.

Dell EMC IT transformation central to 2018 channel strategy
The Dell EMC IT Transformation campaign, launched at the Global Partner Summit, looks to showcase the Dell Technologies portfolio and how partners can modernize IT infrastructure.

For Airbnb, data democratization is a strategic advantage
Despite a general recognition that data has business value, most companies have done little to democratize data. Then there is Airbnb data.

Embrace IT digital transformation and the new tech landscape
It’s time to face IT digital transformation or risk being left behind as IT and revenue become more closely linked together.

Competitive advantages of mobile apps for customers, employees
The advantages of mobile apps for customers include higher revenue, better ad targeting and customer outreach; for employees, it means more efficiency.

Trending Terms
Porter’s Five Forces
SWOT analysis
vertical market
strategic management
core competency
strategic innovation

Writing for Business
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
A. awhile
B. a while
Answer


May 4, 2018  6:24 PM

command and control server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. Continued…

Quote of the Day

“To protect their malicious operations, hackers are constantly looking for techniques to try and obfuscate their C&C infrastructure and to avoid takedowns by making forensic analysis, detection and attribution a lot harder.” – Michael Cobb

Learning Center
AIR-Jumper: How can security camera lights transmit data?
Ben-Gurion University researchers developed aIR-Jumper — an exploit that leverages lights within security cameras. Learn how this targeted attack works.

How are hackers using Twitter as C&C servers for malware?
Hackers are using Twitter instead of C&C servers to spread their malicious Twitoor Android Trojan. Find out how the attack works and how to prevent it.

How can a malicious C&C server remain undetected?
A C&C server used by malware authors can evade detection, but here’s how enterprises can uncover malicious C&C communications.

New cloud threats as attackers embrace the power of cloud
Here’s a look at the top cloud threats in 2018 and some guidelines for protecting platforms and infrastructure in public clouds.

Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the Arachni scanner, and it now works through Telegram after being found on a hacking forum. Nick Lewis explains how this is possible.

Trending Terms
rootkit
ransomware
DDoS attack
botnet
white hat
Trojan horse

Writing for Business
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
A. though
B. although
c. even though
Answer


May 3, 2018  6:05 PM

Ultra Low Energy (ULE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Ultra Low Energy (ULE) is an extension of the Digital Enhanced Cordless Telecommunications (DECT) physical layer specification that supports low power devices. Continued…

Quote of the Day

“ULE technology is ideally suited to support the new wave of home IoT devices. It offers longer range, interference-free RF bandwidth, enhanced security, and natural support for two-way voice and video.” – Tali Chen

Learning Center
Four telecom infrastructure trends driving network of the future
Telecom infrastructure trends driving the network of the future include SDN, NFV, IoT and 5G, but they won’t be deployed without revenue-based reasons to adopt.

Internet of Things market could advance with telecom help
The Internet of Things market may have its best shot at success if telecom providers, with their communications and connections backgrounds, are in the mix.

5G wireless technology influences telecom’s future
Telecom’s future depends on 5G wireless technology to help converge wireless and wireline services and infrastructure.

Telecom vendors feel the pressure of operator transformation plans
Network operators’ focus on business and technology transformations is pressuring telecom vendors to sell pieces, not product suites, along with software.

Use IoT to eliminate the guessing game from your enterprise’s phone bill
To manage IoT devices, enterprises can now call upon their mobile service provider to offer an automated mobility management (AMM) software platform.

Trending Terms
DECT
system-on-a-chip
Z-Wave
star network
ZigBee
voice user interface

Writing for Business
A number of IoT gateway products ____ equipped with additional security features.
A. is
B. are
Answer


May 2, 2018  5:36 PM

composable infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A composable infrastructure is a framework whose physical compute, storage and network fabric resources are treated as services. Continued…

Quote of the Day

“In a nutshell, programmable infrastructure is nothing more than using software and automation — rather than relying on manual processes — to manage, provision and configure infrastructure components.” – Chuck Moozakis

Learning Center
Is programmable infrastructure ready for prime time in networking?
Programmable infrastructure isn’t new, but the concept is finally gaining steam in networking, thanks to the advent of interoperable hardware and automation.

Understand the benefits, limits of composable infrastructure
With composable infrastructure, IT can evolve the virtualization and SDI technology already in its data centers for more efficient resource management.

Composable infrastructure creates new path to SDDC nirvana
Composable infrastructure and products that offer a cloud-like environment may offer a new route to the SDDC — but first, analyze your cloud strategy.

How does composable infrastructure fit in the data center?
Data center architecture could move from CI and HCI to composable infrastructure thanks to its flexibility, speed of modification and cost savings.

IT infrastructure automation boosts digital initiatives
Approaches to IT infrastructure automation like composable infrastructure automate IT, reducing the manual IT tasks that complicate digital business.

Trending Terms
network fabric
bare metal environment
software-defined networking
converged infrastructure
software-defined everything
software-defined data center

Writing for Business
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
A. was
B. were
Answer


May 1, 2018  5:33 PM

integrated development environment (IDE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An integrated development environment (IDE) is a software suite that consolidates the basic tools developers need to write and test software. Continued…

Quote of the Day

“Without IDE tools to visualize your code, the traditional way to analyze source code is to search for strings and then physically connect the dots.” – George Lawton

Learning Center
Build secure coding practices right into the IDE
Not every application is secure by design, which is why developers must be aware of secure coding guidelines and implement secure coding practices when they build software.

AWS appeals to the masses with low-code development project
An AWS low-code development platform in the works will enable nonprogrammers to create applications for the AWS cloud and fires a shot across Microsoft’s bow.

AWS Cloud9 IDE connects dispersed development teams
Developers can use the AWS Cloud9 IDE to work with each other within one console, eliminating geographic boundaries.

Learn about the top mobile app development platforms
Vendors that offer the top mobile app development platforms vary in what they can provide organizations. Here we focus on 12 prominent players in the MADP market.

Seven buying factors to compare mobile app dev platforms
When comparing mobile app dev platforms, buyers should examine what app types they support, as well as lifecycle management, integration and security features.

Trending Terms
interpreted script
GUI
versioning
cloud IDE
NetBeans
Eclipse
Visual Studio .NET

Writing for Business
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze
Answer


April 30, 2018  2:52 PM

evil maid attack

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An evil maid attack is a security exploit that physically targets an unattended computing device. Continued…

Quote of the Day

“There are some things you could do to protect against evil maid attacks: use a strong password, set a password on the bios to prevent changes to the bios, only boot the system off of the hard drive and have some sort of tamper-evident alert if someone changes the hardware.” – Nick Lewis

Learning Center
Keycard vulnerability threatens millions of hotel rooms
A keycard vulnerability enabled researchers to create a master key to access every room in a targeted hotel, potentially putting millions of rooms at risk of a break-in.

Why security incident management is paramount for enterprises
The final component of achieving cybersecurity readiness is building a proper security incident management plan. Here’s how to do it.

Evil maid attacks: How can they be stopped?
An evil maid attack can bypass full disk encryption and expose sensitive corporate data. Here’s how to protect systems and data from evil maids.

How IoT security is different from physical and conventional IT security
There are a number of systematic differences that should make us view IoT security differently than physical security and even conventional IT security.

Data center physical security gets a tougher look
Data center physical security is increasingly a topic that is getting a closer look, with tough questions, from organizations seeking colocation space.

Trending Terms
industrial espionage
keylogger
full-disk encryption
physical security
insider threat

Writing for Business
An enterprise needs to have an overall plan to protect PII and secure _________ sensitive data.
A. their
B. its
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: