Word of the Day: Tech Definitions from WhatIs.com

May 10, 2018  6:34 PM

Wi-Fi Protected Access (WPA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Wi-Fi Protected Access (WPA) is a security standard for wireless internet connections. It improved upon and replaced the original Wi-Fi security standard, Wired Equivalent Privacy (WEP). Continued…

Quote of the Day

“The most common protocol used to connect IoT devices via Wi-Fi is WPA2 — also known as Wi-Fi Protected Access II — as it defines how a router and Wi-Fi client devices perform the ‘handshake’ network connection process to negotiate the encryption used to secure the connection.” – Michael Cobb

Learning Center
How will the new WPA3 protocol strengthen password security?
The WPA3 protocol aims to better protect the next generation of Wi-Fi-enabled devices. Discover how this new Wi-Fi protocol works and how it’s different from its predecessor, WPA2.

WPA3 Wi-Fi protocol aims to improve security in 2018
The Wi-Fi Alliance announced the finalized WPA3 Wi-Fi protocol standards, which will be put in place in 2018 to improve security.

Battle of the IoT networks: Cellular versus Wi-Fi
Cellular or Wi-Fi. Given each technology’s bandwidth, cost, coverage and security characteristics, which should IoT application developers choose? Sierra Wireless’ Philippe Guillemette discusses.

Wireless security protocols: The difference between WEP, WPA, WPA2
Learn the difference between WEP, WPA and WPA2, and find out which of these wireless security protocols is best for your WLAN.

Why WPA2-PSK can be a security risk even with an uncracked key
WPA2-PSK can be used to improve Wi-Fi security, but it has its flaws. Here’s a look at WPA2 and other Wi-Fi security methodologies.

Trending Terms
Extensible Authentication Protocol
hot spot

Writing for Business
Customers began to complain that their Wi-Fi routers were ________ connectivity.
A. losing
B. loosing

May 9, 2018  7:08 PM

Microsoft Windows Server LTSC

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Microsoft Windows Server LTSC (Long-Term Servicing Channel) is a service option for companies that prefer a traditional release cycle of two to three years between major feature updates. Continued…

Quote of the Day

“Microsoft will release a developer-focused Windows Server version twice a year. Businesses can choose between a traditional release cycle or one that suits continuous deployment.” – Stephen J. Bigelow

Learning Center
Multiple choices complicate Windows Server upgrade process
A Windows Server upgrade means more than just migrating existing workloads to the new operating system. Enterprises can tap into advanced software-defined functionality if they pay a premium for the Datacenter edition, but this choice can also affect a hardware refresh plan.

Revved-up Windows Server release cadence now serves DevOps
Microsoft now offers a Windows Server release every six months for fast-moving businesses. Here’s what admins need to know about the Semi-Annual Channel.

Windows Server pricing muddies purchasing decision process
Windows Server pricing surges with each new release of the server operating system, but the software-defined technologies introduced with each ensuing version can provide savings when looking at the full financial picture.

Get to know your Windows 10 update options
The three Windows 10 update options — Insider Preview, the Semi-Annual Channel and the Long-Term Servicing Channel — handle the process differently.

A Windows Server release built for the DevOps crowd
Microsoft customizes a Windows Server release option for enterprises that want the latest container and cloud features to spur their development efforts.

Trending Terms
Microsoft Windows 10 LTSB
Server Core
Nano Server
Microsoft Windows Server SAC
Windows as a service

Writing for Business
A large ______ of dependencies in an operating system can make it hard to change one thing without impacting others.
A. amount
B. number

May 8, 2018  7:04 PM

mobile productivity app

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks. Continued…

Quote of the Day

“Mobile apps make sense for field service workers because they rely on portability and ease of use. These types of employees are rarely in the office, so mobile is often the best way to equip them with the tools they need.” – Harpreet Ahluwalia

Learning Center
Field service mobile apps offer usability, new features
Service companies and mobility have always been a good match, but now field service mobile apps are expanding to include more advanced features such as AR and predictive analytics. Find out how smaller businesses can take advantage of these systems.

AI, security shape mobile app development trends in 2018
Curious about the top mobile app development trends in 2018? Expect artificial intelligence, augmented reality and security to play a big role.

Real-world ways mobile apps boost employee productivity
Mobile applications can be the key to increasing employee productivity, but it’s important for IT to find a way to measure their real-world value for workers.

Pros and cons of AI for mobile IT
Mobile administrators will see the pros and cons of AI in the next few years. Find strategies to take advantage of AI and navigate the problems it may pose.

Four ways to break through mobile business strategy barriers
A mobile business strategy can get organizations’ mobile efforts off the ground while avoiding common roadblocks. Find out four ways to do just that.

Trending Terms
employee productivity
productivity software
mobile device management
enterprise mobility

Writing for Business
I prefer native apps ___ Web apps because they’re customized for my smartphone.
A. than
B. to

May 7, 2018  6:39 PM

competitive advantage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals. Continued…

Quote of the Day

“Wasting project team time today is more significant than just a few years ago. In the current digital era, competitive advantage is based on speed.” – Zeus Kerravala

Learning Center
Corporate IT rebrands its modern role: Reduce complexity
The massive amount of data generated by digital technologies has pushed corporate IT into a power position at many enterprises. That has its pluses and minuses, according to panel of IT executives at the Argyle 2018 CIO Leadership Forum.

Dell EMC IT transformation central to 2018 channel strategy
The Dell EMC IT Transformation campaign, launched at the Global Partner Summit, looks to showcase the Dell Technologies portfolio and how partners can modernize IT infrastructure.

For Airbnb, data democratization is a strategic advantage
Despite a general recognition that data has business value, most companies have done little to democratize data. Then there is Airbnb data.

Embrace IT digital transformation and the new tech landscape
It’s time to face IT digital transformation or risk being left behind as IT and revenue become more closely linked together.

Competitive advantages of mobile apps for customers, employees
The advantages of mobile apps for customers include higher revenue, better ad targeting and customer outreach; for employees, it means more efficiency.

Trending Terms
Porter’s Five Forces
SWOT analysis
vertical market
strategic management
core competency
strategic innovation

Writing for Business
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
A. awhile
B. a while

May 4, 2018  6:24 PM

command and control server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. Continued…

Quote of the Day

“To protect their malicious operations, hackers are constantly looking for techniques to try and obfuscate their C&C infrastructure and to avoid takedowns by making forensic analysis, detection and attribution a lot harder.” – Michael Cobb

Learning Center
AIR-Jumper: How can security camera lights transmit data?
Ben-Gurion University researchers developed aIR-Jumper — an exploit that leverages lights within security cameras. Learn how this targeted attack works.

How are hackers using Twitter as C&C servers for malware?
Hackers are using Twitter instead of C&C servers to spread their malicious Twitoor Android Trojan. Find out how the attack works and how to prevent it.

How can a malicious C&C server remain undetected?
A C&C server used by malware authors can evade detection, but here’s how enterprises can uncover malicious C&C communications.

New cloud threats as attackers embrace the power of cloud
Here’s a look at the top cloud threats in 2018 and some guidelines for protecting platforms and infrastructure in public clouds.

Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the Arachni scanner, and it now works through Telegram after being found on a hacking forum. Nick Lewis explains how this is possible.

Trending Terms
DDoS attack
white hat
Trojan horse

Writing for Business
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
A. though
B. although
c. even though

May 3, 2018  6:05 PM

Ultra Low Energy (ULE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Ultra Low Energy (ULE) is an extension of the Digital Enhanced Cordless Telecommunications (DECT) physical layer specification that supports low power devices. Continued…

Quote of the Day

“ULE technology is ideally suited to support the new wave of home IoT devices. It offers longer range, interference-free RF bandwidth, enhanced security, and natural support for two-way voice and video.” – Tali Chen

Learning Center
Four telecom infrastructure trends driving network of the future
Telecom infrastructure trends driving the network of the future include SDN, NFV, IoT and 5G, but they won’t be deployed without revenue-based reasons to adopt.

Internet of Things market could advance with telecom help
The Internet of Things market may have its best shot at success if telecom providers, with their communications and connections backgrounds, are in the mix.

5G wireless technology influences telecom’s future
Telecom’s future depends on 5G wireless technology to help converge wireless and wireline services and infrastructure.

Telecom vendors feel the pressure of operator transformation plans
Network operators’ focus on business and technology transformations is pressuring telecom vendors to sell pieces, not product suites, along with software.

Use IoT to eliminate the guessing game from your enterprise’s phone bill
To manage IoT devices, enterprises can now call upon their mobile service provider to offer an automated mobility management (AMM) software platform.

Trending Terms
star network
voice user interface

Writing for Business
A number of IoT gateway products ____ equipped with additional security features.
A. is
B. are

May 2, 2018  5:36 PM

composable infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A composable infrastructure is a framework whose physical compute, storage and network fabric resources are treated as services. Continued…

Quote of the Day

“In a nutshell, programmable infrastructure is nothing more than using software and automation — rather than relying on manual processes — to manage, provision and configure infrastructure components.” – Chuck Moozakis

Learning Center
Is programmable infrastructure ready for prime time in networking?
Programmable infrastructure isn’t new, but the concept is finally gaining steam in networking, thanks to the advent of interoperable hardware and automation.

Understand the benefits, limits of composable infrastructure
With composable infrastructure, IT can evolve the virtualization and SDI technology already in its data centers for more efficient resource management.

Composable infrastructure creates new path to SDDC nirvana
Composable infrastructure and products that offer a cloud-like environment may offer a new route to the SDDC — but first, analyze your cloud strategy.

How does composable infrastructure fit in the data center?
Data center architecture could move from CI and HCI to composable infrastructure thanks to its flexibility, speed of modification and cost savings.

IT infrastructure automation boosts digital initiatives
Approaches to IT infrastructure automation like composable infrastructure automate IT, reducing the manual IT tasks that complicate digital business.

Trending Terms
network fabric
bare metal environment
software-defined networking
converged infrastructure
software-defined everything
software-defined data center

Writing for Business
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
A. was
B. were

May 1, 2018  5:33 PM

integrated development environment (IDE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An integrated development environment (IDE) is a software suite that consolidates the basic tools developers need to write and test software. Continued…

Quote of the Day

“Without IDE tools to visualize your code, the traditional way to analyze source code is to search for strings and then physically connect the dots.” – George Lawton

Learning Center
Build secure coding practices right into the IDE
Not every application is secure by design, which is why developers must be aware of secure coding guidelines and implement secure coding practices when they build software.

AWS appeals to the masses with low-code development project
An AWS low-code development platform in the works will enable nonprogrammers to create applications for the AWS cloud and fires a shot across Microsoft’s bow.

AWS Cloud9 IDE connects dispersed development teams
Developers can use the AWS Cloud9 IDE to work with each other within one console, eliminating geographic boundaries.

Learn about the top mobile app development platforms
Vendors that offer the top mobile app development platforms vary in what they can provide organizations. Here we focus on 12 prominent players in the MADP market.

Seven buying factors to compare mobile app dev platforms
When comparing mobile app dev platforms, buyers should examine what app types they support, as well as lifecycle management, integration and security features.

Trending Terms
interpreted script
cloud IDE
Visual Studio .NET

Writing for Business
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze

April 30, 2018  2:52 PM

evil maid attack

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An evil maid attack is a security exploit that physically targets an unattended computing device. Continued…

Quote of the Day

“There are some things you could do to protect against evil maid attacks: use a strong password, set a password on the bios to prevent changes to the bios, only boot the system off of the hard drive and have some sort of tamper-evident alert if someone changes the hardware.” – Nick Lewis

Learning Center
Keycard vulnerability threatens millions of hotel rooms
A keycard vulnerability enabled researchers to create a master key to access every room in a targeted hotel, potentially putting millions of rooms at risk of a break-in.

Why security incident management is paramount for enterprises
The final component of achieving cybersecurity readiness is building a proper security incident management plan. Here’s how to do it.

Evil maid attacks: How can they be stopped?
An evil maid attack can bypass full disk encryption and expose sensitive corporate data. Here’s how to protect systems and data from evil maids.

How IoT security is different from physical and conventional IT security
There are a number of systematic differences that should make us view IoT security differently than physical security and even conventional IT security.

Data center physical security gets a tougher look
Data center physical security is increasingly a topic that is getting a closer look, with tough questions, from organizations seeking colocation space.

Trending Terms
industrial espionage
full-disk encryption
physical security
insider threat

Writing for Business
An enterprise needs to have an overall plan to protect PII and secure _________ sensitive data.
A. their
B. its

April 27, 2018  12:05 AM

virtual private cloud (VPC)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A virtual private cloud (VPC) is the logical division of a service provider’s public cloud multi-tenant architecture to support private cloud computing in a public cloud environment. Continued…

Quote of the Day

“It isn’t enough for a virtual private cloud server provider to enable subscribers to create additional virtual private clouds. The infrastructure must also support the use of separate security domains.” – Brien Posey

Learning Center
Compare virtual private cloud server providers
When comparing virtual private cloud server providers, consider cost, the underlying platform, whether they offer dedicated hardware and data lines, and whether they support multiple subnets and VPCs with separate security domains.

Virtual private cloud vs. private cloud differences explained
The distinction between virtual private cloud vs. private cloud lies in where the data resides. A virtual private cloud is an allocated portion of the public cloud, whereas a private cloud is on premises.

Weigh virtual private cloud benefits for enterprise IT teams
Virtual private cloud benefits range from compliance to smoother migrations. Compare VPCs to on-premises private clouds to see if they’re right for you.

Hybrid cloud providers offer different architecture types
Hybrid cloud providers like Cisco/GCP and AWS — with VPC or VMware Cloud on AWS — can allocate a portion of the public cloud to be used as a private cloud or support an on-premises private cloud. Vendors like Microsoft allow customers to move the public cloud to the private cloud with Azure Stack.

Flow logs sharpen visibility into GCP network
VPC Flow Logs is a welcome addition to GCP, as it adds network visibility to monitor and respond to issues with security or performance on Google’s public cloud. Though Google has played catch-up here, it also leaps over the competition in some important ways.

Trending Terms
private cloud
public cloud
cloud cartography
logical network
virtual LAN
Amazon VPC

Writing for Business
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: