Word of the Day: Tech Definitions from WhatIs.com

August 15, 2019  4:38 PM

content services platform

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A content services platform (CSP) is cloud-based software that enables users to create, share, collaborate on and store text, audio and video content. Continued…

Quote of the Day

“To provide full value, CSPs need to better reflect business needs — and organizations need to move beyond the concept of content services and think about business object services.” – Laurence Hart

Learning Center
The next step in ECM: The content services platform
Expert Laurence Hart explains why ECM vendors are taking a new approach to the evolution of the content services platform.

Business objects are the future of content services platforms
Learn why it may be helpful to think about the future of content services in terms of business object services. This model can help you think about business needs rather than technical processes.

Content services and archiving records: It’s complicated
Content services create rich experiences in the moment, but will tomorrow’s tech be able to render today’s content services archives? Read about some new approaches to content services and archiving.

Nuxeo among new wave of content services platform vendors
Nuxeo is among a group of content services platform vendors that were previously referred to as part of the enterprise content management sector. A Canadian tribal council is using the Nuxeo platform to preserve several dozen native languages.

2019 trends in content management: Personalization, AI
Trends in content management software to watch for in 2019 include AI and machine learning; personalization; open services; big data; and the battle over enterprise market share among Box, Microsoft, IBM, OpenText and Dropbox.

Trending Terms
enterprise content management
content as a service
content delivery
content management system
web content management
content automation

Quiz Yourself
Neither of the content analytics applications _____ backwards compatible.
a. is
b. are

August 14, 2019  3:57 PM

3-2-1 Backup Strategy

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

The 3-2-1 backup is a reliable recovery methodology for ensuring that data is protected adequately and backup copies of the data are available when needed. Continued…

Quote of the Day

“Off-site backup has always been a key piece of the 3-2-1 Rule of Backup: three copies of data, on two different media, with one of the copies off-site.” – Nick Cavalancia

Learning Center
Protect backups from ransomware and other security risks
Backups are an excellent way to return enterprises to a known good state. That’s why it’s essential to secure and protect backups from ransomware and other security risks, whether man-made or natural. Learn how to align your backup and security strategies for better protection and recovery.

Veeam backup software preps for NAS, more ransomware protection
Veeam backup software takes on NAS and ransomware. The data protection and management provider has also shifted to a subscription-focused licensing model.

Does multi-cloud backup have a future, or is it hype?
Is multi-cloud backup worth the hype? Many businesses see its value, but it may not be a major concern for yours. Looking at it from a few different perspectives could help you decide.

5 biggest data backup mistakes — and how to avoid them
Data backup mistakes can be ruinous. For example, what if you have only one backup copy and ransomware gets in? Explore how to avoid common errors to protect your business.

What is the difference between cloud backup and off-site backup?
We delve into the cloud backup vs. off-site backup argument, and outline the four areas you need to consider when creating a strategy that will enable you to recover your data if a disaster strikes.

Trending Terms
data backup software
cloud backup
cloud storage
continuous data protection
full backup
cloud-to-cloud backup

Quiz Yourself
Continuous data protection offers recovery options _______ are simply not possible with a traditional backup system.
a. that
b. which

August 13, 2019  4:15 PM

service-oriented architecture (SOA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Service-oriented architecture (SOA) is a software development model for distributed application components that incorporates discovery, access control, data mapping and security features. Continued…

Quote of the Day

“SOA and microservices often differ more on implementation than on principle.” – Tom Nolle

Learning Center
API workflow design patterns for microservices scenarios
Workflow orchestration is fundamental for multicomponent applications. Often, the first step in designing a microservice application is to decide from a number of API workflow design patterns.

5 basic SOA principles that still apply to microservices
Microservices represent a shift in application development and management practices, but the old SOA principles haven’t gone far. While the particulars of implementation may have changed, the fundamental goals of microservices and SOA remain the same.

The fundamental differences between microservices and SOA
While many basic principles carry over, there are still many nuances between microservices and SOA. Find out what SOA developers should know about working with microservices and how to seamlessly make a transition from the monolith.

How integration platform as a service stacks up against PaaS and SaaS
Integration platform as a service is similar to its more well-known counterparts, SaaS and PaaS, but software teams must make an important distinction around how they intend to use these services.

Microservices vs. SOA: Quiz yourself on the great debate
How much do you know when it comes to the microservices vs. SOA debate? Take this quiz and test your knowledge on the architectural approaches.

Trending Terms
SOA registry
enterprise service bus
service-oriented management
SOA networking

Quiz Yourself
If you’re not _______ well-versed in microservices and containers, you’re behind the pack.
A. already
B. all ready

August 13, 2019  4:01 PM

RFID (radio frequency identification)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. Continued…

Quote of the Day

“With the rise of smart retail and high competition among companies, RFID technology plays an increasingly important role in improving the competitiveness of modern retail enterprises.” – Morris Qiu

Learning Center
Use cases of RFID in retail
RFID technology is bringing new opportunities for retailers, says Chainway’s Morris Qiu, helping them improve supply chain efficiency, collect and analyze data, and improve customer experience.

How IoT is changing the future of the retail industry
The retail landscape is getting a makeover thanks to the internet of things. Mindinventory’s Mehul Rajput discusses six benefits of IoT in retail.

Use cases and benefits of smart sensors for IoT
Learn the ways in which smart sensors for IoT are transforming how various verticals, from manufacturing to logistics, collect and analyze data to improve processes and decision-making.

Keycard vulnerability threatens millions of hotel rooms
A keycard vulnerability enabled researchers to create a master key to access every room in a targeted hotel, potentially putting millions of rooms at risk of a break-in.

Which supply chain visibility tools help improve logistics?
Today, six technologies — new and older — are functioning together to create more effective supply chain visibility tools. Here’s a look.

Trending Terms
inventory management
supply chain
RFID virus
smart label
active RFID
RFID tagging

Quiz Yourself
An enhanced driver’s license contains _______ that allows authorities to pull up your data.
a. a RFID tag
b. an RFID tag

August 9, 2019  4:40 PM

.NET Framework

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

.NET Framework is a managed execution environment for Windows that allows software developers to create an app in one programming language and be assured that the app will be able to work with code written in other languages. Continued…

Quote of the Day

“With the right tools, investigating and testing, .NET applications can be easier, faster and less painful.” – Matt Heusser

Learning Center
Microsoft gets its dev mojo back with Linux, .NET 5, web IDE
Microsoft showed off new and upcoming tools and services debuted at Microsoft Build 2019, including Visual Studio Online, a Linux distro and .NET 5, which will help developers build along the company’s tools mantra to create any app on any platform.

3 ways Steeltoe opens the door to microservices in .NET
Steeltoe, an open source project, finally brings microservices to .NET developers who previously needed to learn Java to work in a distributed architecture. Learn about the three major Steeltoe components that enable microservices in .NET.

Deploy Microsoft IIS server, .NET apps in Windows containers
Windows containers and Microsoft IIS server offer a way to modernize existing .NET applications. The steps include installing a Windows Server Core VM, creating the container inside the VM, installing Docker engine, pulling Docker images and implementing a container with an IIS image.

.NET programming language tutorial: Making more with .NET development
The .NET programming language tutorial covers how to develop with .NET. Learn about .NET and cloud, .NET tools, and application development with .NET.

Microsoft .NET framework: Still viable in the cloud computing age?
The Microsoft .NET framework is open source and understands app development for mobile and cloud computing. It’s far from obsolete, the company says.

Trending Terms
Visual Basic .NET
.NET 3.0
Visual Studio .NET
Common Language Runtime

Quiz Yourself
_______ Active Directory enables single sign-on capabilities for Microsoft apps, such as Office 365 and Dynamics CRM.
A. In addition,
B. In addition

August 7, 2019  4:43 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

SecOps is a management approach that connects security and operations teams, similar to how DevOps unifies software developers and operations professionals. Continued…

Quote of the Day

“To help transition to a DevSecOps model to protect enterprises, security teams need to identify key stakeholders, provide examples of specific company security events and work toward creating crossover teams.” – Michael Cobb

Learning Center
How to start building a DevSecOps model
To successfully transition to a DevSecOps model that bakes security into software from the beginning, CISOs and security teams need to sell key stakeholders on business-specific needs for the cultural change, identify security events in their areas of responsibility and create a pilot program to ease the transition.

Boost application security in DevOps with DevSecOps
Application security in DevOps needs to be top priority during the development stage. Software developers can improve their products by shifting security to the left.

DevSecOps shift begins, but remains a work in progress
DevSecOps — a philosophy in which security is deeply embedded into application delivery, from business requirements to production delivery — is still subject to debate about its long-term direction and feasibility.

Build up a DevSecOps pipeline for fast and safe code delivery
Containers and CI/CD promise to get code developments onto live servers quickly with automated steps. But there’s no sense rushing out compromised and vulnerable builds. These practical security additions create a DevSecOps pipeline with all the speed and less worry.

Use the right DevSecOps tools for more secure development
More than 75% of applications have security vulnerabilities. Here’s how DevSecOps tools and a culture change can make software safer.

Trending Terms
Agile software development
rugged DevOps
DevOps 2.0
continuous integration

Quiz Yourself
Successfully _______ a DevOps culture in a data center isn’t easy, but it brings great rewards.
A. adapting
B. adopting

August 6, 2019  7:50 PM

supply chain security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Supply chain security is the part of supply chain management (SCM) that focuses on minimizing risk for supply chain, logistics and transportation management systems (TMS). Continued…

Quote of the Day

“Poor internal security procedures and a lack of compliance protocols — especially for small suppliers — can introduce cybersecurity threats into global supply chains.” – Linda Rosencrance

Learning Center
Why is third-party risk management essential to cybersecurity?
Enterprises must protect their own networks, but third parties add new challenges for defense. ESG’s Jon Oltsik explains what third-party risk management is and how to keep up with new developments.

How supply chain security has evolved over two decades
Supply chain security has long been an important part of overall enterprise security. And with recent headlines, it’s back in the spotlight. Expert Ernie Hayden outlines everything you need to know about physical and cyber supply chain security.

Supply chain software poses security risks
Enterprise supply chain software can introduce information security risks to companies, particularly those relying on third-party vendors without having the proper controls in place.

Tips for preventing supply chain attacks
Companies can prevent supply chain attacks by implementing a number of cybersecurity best practices, including performing security assessments and validations to build trust between managers and third-party vendors.

The essential guide to supply chain management best practices
Supply chain management best practices are about the essentials: collaboration, strategy and technology. This guide provides insights into a successful omnichannel approach, supply chain visibility and sustainability, along with the sophisticated tools and technologies needed to achieve those goals.

Trending Terms
supply chain management
transportation management system
risk management
third-party logistics
risk assessment

Quiz Yourself
Supply chain visibility can help manufacturers in managing _______ periods of inbound and outbound activity.
A. peak
B. peek
C. pique

August 2, 2019  7:55 PM

AWS Firecracker

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Firecracker is a light-weight virtualization technology that has been open-sourced by Amazon Web Services. Continued…

Quote of the Day

“As micro VM technology achieves more attention and broader adoption, it’s plausible to see more native integration support for AWS Firecracker.” – Stephen J. Bigelow

Learning Center
Are there tools or platforms that support AWS Firecracker?
AWS Firecracker provides a few tools, such as firectl, to help ease deployment, but admins might be disappointed by the lack of key tool integrations, such as Kubernetes and Docker. But as micro VM technology continues to gain traction, admins might not have to wait much longer.

Assess the micro VM market with AWS Firecracker
Micro VMs offer similar benefits to containers: They’re quick and lightweight, but they’re still VMs. Assess how AWS Firecracker stacks up against the competition of micro VMs and container systems before launching this open source virtualization product.

Use AWS Firecracker to build micro VMs for containerized apps
AWS’ Firecracker can create micro VMs and support a wide range of serverless projects. Learn how to use the open source project to get the benefits of virtualization and containers.

How do I obtain, deploy and update AWS Firecracker?
Understanding AWS Firecracker protocols for obtaining, deploying and running the software is vital to its performance. Learn more about where to find the latest updates and supporting software.

AWS Firecracker microVMs provide isolation and agility
AWS Firecracker uses a Linux KVM hypervisor to deploy lightweight VMs for multi-tenant container workloads. Take advantage of VM isolation and security in addition to container agility and performance with Firecracker microVMs.

Trending Terms
micro VM
kernel-based VM
AWS Lambda
AWS Fargate

Quiz Yourself
We use Amazon S3 to ________ local storage.
A. complement
B. supplement

August 1, 2019  7:58 PM

value-based healthcare

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Value-based healthcare, also known as value-based care, is a payment model that rewards healthcare providers for providing quality care to patients. Continued…

Quote of the Day

“Social determinants will begin playing an ever-increasing role in value-based care collaborations of the future.” – Michelle Mattson-Hamilton

Learning Center
Healthcare CIOs straddle fee-for-service, value-based care
At the 11th annual mHealth & Telehealth World Summit in Boston, healthcare leaders including Brigham and Women’s Hospital CIO Adam Landman touched on the impact of value-based care, as well as challenges health systems face transitioning to the reimbursement model.

With the onset of value-based care, machine learning is making its mark
As healthcare organizations shift to a value-based care model, they may need methods to identify risk like those created by Innovaccer. The company has created an individualized risk prediction model that uses clinical data and social determinants of health to determine a patient’s future cost of care.

Medical group sees the future in value-based healthcare
The Hatfield Medical Group in Arizona is going all out to become a full-time provider of value-based healthcare. But the move takes time — not all payers are on board — and it requires passion and investment in technology and staff.

Value-based healthcare is steeped in technology and policy
Don’t underestimate the role of health IT professionals in value-based healthcare, which includes equal parts medical treatment, policy and technology.

Insurers join forces to control value-based healthcare delivery
On the shoulders of government mandates, commercial insurers are key drivers in making the transition to value-based healthcare delivery a reality in hospitals and health systems through corporate joint ventures, analytics and greater control over actual delivery of patient care.

Trending Terms
accountable care organization
preventive health
population health management
personal health information

Quiz Yourself
The FDA reclassified sutures as Class II medical devices in the early ______.
A. 1990’s
B. 1990s

July 31, 2019  8:36 PM

container management software

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Container management software is programming that automates the creation, destruction, deployment and scaling of software containers in an information technology (IT) infrastructure. Continued…

Quote of the Day

“Containers can be crucial to a business’ modernization efforts. To ensure a successful application modernization strategy, learn how to evaluate container management software.” – Kurt Marko

Learning Center
Get to know data storage containers and their terminology
Things are looking up for data storage containers, partly thanks to the complexity and costs of using virtual machines. We’ve put together a glossary of terms to know when considering containerization.

Effectively manage containers and improve workload performance
To properly manage containers, admins should have a strong understanding of the pros and cons of containers, different management tool features and how improper management might affect their workloads.

The history of Docker’s climb in the container management market
Since its early conception, container technology has been a topic of conversation for IT developers and users. With the emergence of Docker, interest in container management software skyrocketed. Learn more about the history of Docker and its influence in the container management market.

When assessing container management software, think interoperability
Businesses using containers to help execute application modernization strategies need to know how to evaluate container management software.

Rounding up leading container management software in detail
Acquiring effective container management software is a complicated process. Read these comprehensive product descriptions to find the best vendor — or vendors.

Trending Terms
native cloud application

Quiz Yourself
If you’re not _______ well-versed in microservices and containers, you’re behind the pack.
A. already
B. all ready

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: