Word of the Day: Tech Definitions from WhatIs.com


June 4, 2018  6:34 PM

rapid mobile app development (RMAD)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Rapid mobile app development (RMAD) is the use of low-code or no-code programming tools to quickly create and deploy mobile apps. Continued…

Quote of the Day

“A key facet of RMAD is that it supports individuals without development expertise — also known as citizen developers — by relying on low-code or no-code development techniques.” – Erica Mixon

Learning Center
Five rapid application development tools to consider for mobile
Learn about different vendors’ low- and no-code platforms, micro apps, and more in this rundown of rapid application development tools.

Developers at the mobile edge
We look at the challenges and opportunities to be found in creating mobile apps for an expanding array of devices.

How RMAD tools affect IT and mobile developer jobs
Experienced app developers looking for work in mobile don’t need to sweat RMAD tools taking their jobs, because it almost never happens.

How IT and end users can build mobile apps with RMAD tools
RMAD tools make it easier for IT or end users to build mobile apps themselves. But with so many vendors to choose from, finding the right one can take time.

Simplify mobile app development for the enterprise
Mobile app development for the enterprise can get costly if you let it. But there are a plethora of options to make your app dev journey a pleasant one.

Trending Terms
progressive web app
citizen development
mobile application development platform
LCNC platform
rapid application development
app monetization
Microsoft PowerApps

Writing for Business
Deployment of GPS-enabled mobile apps _______ dramatically increased during the last two years.
A. has
B. have
Answer

May 31, 2018  6:26 PM

active defense

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An active defense is the use of offensive actions to outmaneuver an adversary and make an attack more difficult to carry out. Continued…

Quote of the Day

“The concept of active defense is based on increasing the probability of an attacker making a mistake and revealing their presence within the network.” – Carolyn Crandall

Learning Center
Georgia governor vetoes controversial cybersecurity bill
A cybersecurity bill that would have criminalized unauthorized access to computer systems was vetoed in Georgia this week after strong opposition from Google, Microsoft and other leaders in the tech community.

How does an active defense system benefit enterprise security?
How do active defense systems on private networks work? Here’s a closer look at enterprise options for these deception techniques.

Defense-in-depth strategy: Growing cyberthreat intelligence
Active defense-in-depth strategy is needed in cybersecurity. Find out what needs to be changed to improve cyberthreat intelligence and network security.

Active defense: The perils of cybervigilantism
Active defense strategies can be risky — and costly — for businesses, but do the benefits outweigh the downsides? Our #CIOChat participants highlight the hazards of hacking back.

David Neuman: The CISO position and keeping the cloud safe
Before taking a CISO position in the private sector, David Neuman rose up through the enlisted ranks, becoming an officer with global responsibilities.

Trending Terms
critical infrastructure and key resources
cryptojacking
deception technology
counterintelligence
incident response
malware

Writing for Business
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
A. though
B. although
C. even though
Answer


May 30, 2018  6:16 PM

cross-platform mobile development

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Cross-platform mobile development is the creation of software applications that are compatible with multiple mobile operating systems. Continued…

Quote of the Day

“Endpoint diversity and the differences in developer skill sets have made it critical that today’s mobile apps have strong performance across multiple platforms.” – Eric Klein

Learning Center
Cross-platform mobile app development is more viable than ever
Cross-platform mobile app development is now made simpler with a variety of tools and approaches. Organizations should take into account their existing developers’ experience.

DevOps, cross-platform, test are top mobile developer skills
Learn why mobile developer skills enterprises value — such as DevOps, cross-platform and test-driven development — differ from top skills on the consumer side.

Mobile application development trends away from native
Mobile application development trends reflect business users’ demands. Now, those demands include simplicity and unification, according to Sapho’s CTO.

Four tips for reducing mobile app development costs
A high mobile app development cost can be a death sentence for an organization’s mobility efforts. Keep prices low by using sketches and existing technologies.

Five rapid application development tools to consider for mobile
earn about different vendors’ low- and no-code platforms, micro apps, and more in this rundown of rapid application development tools.

Trending Terms
native app
hybrid mobile app
mobile application development platform
progressive web app
HTML5 mobile app
mobile operating system

Writing for Business
I prefer native apps ___ Web apps because they’re customized for my smartphone.
A. than
B. to
Answer


May 29, 2018  7:39 PM

counterintelligence

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Counterintelligence (CI) is the information gathered and actions taken to identify and protect against an adversary’s knowledge collection activities or attempts to cause harm through sabotage or other actions. Continued…

Quote of the Day

“The easiest way to implement a full counterintelligence stack is to use deception technology that misinforms and misleads attackers, thereby preventing them from furthering their attack.” – Carolyn Crandall

Learning CenterEC calls on online platforms to develop common code of practice to tackle ‘disinformation’
The European Commission says online platforms such as social media and video sites, have not done enough to tackle unethical use, and call on them “to decisively step up their efforts to tackle online disinformation.”

Election cyberattack proves people are still the biggest flaw
Experts said the NSA leak alleging election cyberattacks by Russia prove people are still the biggest cybersecurity flaw.

OURSA takes on RSA Conference to highlight diversity
After RSA Conference came under fire for a lack of female keynote speakers, infosec professionals formed the Our Security Advocates event, or OURSA.

How intelligence data leaks caused collateral damage for infosec
Intelligence data leaks, like the recent ones at the NSA and CIA, can cause serious damage for cybersecurity. Here’s how.

CISO job description: Business function more than IT
The CISO job description is always up for debate. Is it moving beyond IT to influence broader security and risk management initiatives?

Trending Terms
attack vector
disinformation
confidentiality, integrity, and availability
data loss prevention
network forensics
deception technology
honeypot
virtual honeypot

Writing for Business
The former bank technician admitted to the identity theft exploit and said he’d had a guilty ________ about it.
A. conscious
B. conscience
Answer


May 25, 2018  7:36 PM

continuous performance management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Continuous performance management, in a human resource management context, is the supervision of an employee’s work through one-to-one discussions and ongoing feedback from supervisors and regularly scheduled check-ins. Continued…

Quote of the Day

“With continuous performance management, you actually can reflect back on a yearlong conversation you’ve had with your employee and make your performance review reflect more greatly the work that the person has done.” – Doug Dennerline

Learning Center
Federal HR wants to modernize cybersecurity recruiting, pay
The Trump administration plans to modernize cybersecurity recruiting and managing. It is asking vendors for information about the cost, tools and technologies it will need to achieve its federal HR goals.

Continuous performance management a rich source of talent analytics
Read how companies use continuous performance management to improve employee satisfaction and build their storehouse of talent through analytics.

Continuous performance management firm, BetterWorks, reboots
BetterWorks Systems, a startup on track to make a name for itself in the continuous performance management market, faced a sexual harassment lawsuit. It then went seven months without a CEO. The court case was dismissed, a new CEO was appointed and an AI-related upgrade is in the works.

Tips for automating the performance management process
Get tips on how to automate the performance management process, regardless of whether you have a full talent management suite or just documents and email.

Continuous feedback performance management boosts worker productivity
Learn the basics of continuous feedback performance management from companies that replaced annual reviews with coaching, peer reviews and career planning.

Trending Terms
talent activation
human capital management
performance management software
corporate performance management
BetterWorks
Zugata

Writing for Business
_____ performance review is scheduled for three o’clock?
A. Who’s
B. Whose
Answer


May 24, 2018  7:18 PM

General Data Protection Regulation (GDPR)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

General Data Protection Regulation (GDPR) is legislation that will update and unify data privacy laws across the European Union. Continued…

Quote of the Day

“GDPR demands a global shift in thinking with respect to the collection and treatment of personal data. In simple terms, businesses don’t get a free-for-all mandate to use personal data as they please when they get consent. Businesses don’t own the personal data — the citizen does.” – Luis Franco

Learning Center
GDPR deadline: Keep calm and GDPR on
With the GDPR deadline looming, companies may still be scrambling to do “something” about it, but with less than 30 days to go the best move for many may be to wait and watch, and perhaps just consider ways in which GDPR may not be as important as everyone is saying.

Test your knowledge of GDPR rights and AWS data protection
The EU’s major data protection overhaul will dramatically alter how enterprises handle sensitive personal information. New GDPR rights turn over control of individual data to the consumer and limit what an organization can do with it.

How Salesforce teams will feel the impact of GDPR
The impact of GDPR for sales teams on Salesforce will call for trimming data processes down to the bone — and designing a process to ‘forget’ those who ask.

Six data risk management steps for GDPR compliance
A data governance framework must include data risk management. Learn the steps to achieve GDPR compliance and the components of data risk management, including data asset surveillance; data security; and protection, risk assessment and data classification.

GDPR call center compliance can be a sticky wicket
There are several questions you need to answer and answers you need to document when it comes to GDPR call center compliance, a process that can require the collaboration of business executives, call center managers and outside lawyers to establish and communicate data protection policies.

Trending Terms
EU Data Protection Directive Directive
data breach
express consent
data governance
right to be forgotten
Data Protection Bill 2017

Writing for Business
GDPR’s requirement for ‘privacy by design’ demands new approaches to customer __________ giving customers complete control over their data.
A. relationships, including
B. relationships including
Answer


May 23, 2018  7:31 PM

robojournalism

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Robojournalism is the use of software programs to generate articles, reports and other types of content. Continued…

Quote of the Day

“Humans are, frankly, much, much better at adding context than machines. And machines are better at doing that data processing and number crunching than humans.” – James Kotecki

Learning Center
Natural language generation software making inroads in enterprises
Natural language generation software is gradually finding its way into enterprises as businesses look to deploy emerging artificial intelligence tools.

AP uses data collaboration platform to spread data journalism
The young field of data journalism needs data tooling to add factual context to stories. The Associated Press turned to a data collaboration platform to improve its ability to dig into data sets.

‘Robot writers’ adept at natural language generation, but they’re no Melville
Robots aren’t taking over the world (just yet, anyway), but the idea that robots could take over the world is certainly taking over the conversation among techies.

What to look for in web content management software
Web content management software must help organizations manage the entire content creation process. Here are some tips when considering a WCM platform.

Forbes digital media strategy monetizes content management system
Forbes is hoping to make its CMS system a competitive differentiator for digital publishing.

Trending Terms
content generation software
data mining
machine learning
software substitution
natural language generation
AI

Writing for Business
The promise of automation is that people will need to work _____ hours.
A. fewer
B. less
Answer


May 22, 2018  7:26 PM

CDN (content delivery network)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A CDN (content delivery network), also called a content distribution network, is a group of geographically distributed and interconnected servers that provide cached internet content from a network location closest to a user to accelerate its delivery. Continued…

Quote of the Day

“It’s doubtful streaming video would be practical today without CDNs, and the same is likely true for future applications, especially IoT, that require quick analysis and response to events.” – Tom Nolle

Learning Center
What is CDN technology, and who are the current CDN providers?
This tutorial on content delivery networks looks at the advantages of CDN technology for the enterprise and the growing number of services offered by CDN providers.

New CDN services give providers an edge in WAN marketplace
The CDN services market is expected to experience high growth in the next five years, as enterprises move more workloads in the public cloud, where new CDN optimization and security services will target web performance and security at the network edge.

Future internet infrastructure to utilize fiber, edge hosting, CDNs
In the future internet infrastructure, fiber deployment, edge hosting and CDNs could have a radically different mix.

Growing CDN services market changes to meet cloud needs
Enterprise cloud and application development are driving demands for expanded CDN services, including security and access to APIs, to help push network performance and scalability.

CDN providers comparison: Highlighting vendors’ focus
Content delivery networks used to just be for accelerating website performance, but now, CDN providers are offering more services as competition heats up. This CDN providers comparison highlights what you need to know.

Trending Terms
point-of-presence
load balancing
solid-state drive
dynamic and static
over-the-top
content delivery

Writing for Business
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
A. was
B. were
Answer


May 21, 2018  2:37 AM

serverless computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services. Continued…

Quote of the Day

“If executed correctly, a serverless architecture can save development teams time when pushing out new features and can scale nearly infinitely.” – Chris Moyer

Learning Center
IT pros test out fresh crop of serverless monitoring tools
Serverless monitoring tools have quickly added sophisticated features, but a view of the serverless infrastructure that includes distributed tracing and third-party dependencies awaits further development.

The pros and cons of serverless architecture
Serverless architecture can save development teams time when pushing out new features and scaling, but it does not come without trade-offs.

Serverless infrastructure calls for updated IT ops expertise
Enterprises will need IT ops pros with systems engineering expertise to bring serverless infrastructure for complex apps to maturity.

When is serverless technology best for app modernization?
Red Hat serverless technology expert Rich Sharples analyzes why some businesses are exploring serverless use cases for application modernization.

Know when to implement serverless vs. containers
IT pros must be equipped to guide application deployments onto serverless vs. containers, or vice versa, for off-the-shelf apps, in-house projects and microservices.

Trending Terms
event-driven architecture
noops
AWS Lambda
Microsoft Azure Functions
enterprise application integration
cloud services
event handling

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
A. irregardless
B. regardless
Answer


May 17, 2018  5:40 PM

self-service business intelligence (BI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Self-service business intelligence (SSBI) is an approach to data analytics that enables business users to access and work with corporate data even though they do not have a background in statistical analysis, business intelligence (BI) or data mining. Continued…

Quote of the Day

“Whereas guided discovery tools operate with a preset collection of data and metrics, self-service BI tools enable business users to add data and define new metrics when performing analysis without IT intervention.” – Rick Sherman

Learning Center
Seven good data visualization practices for visual integrity
With more users involved in the BI and analytics process, it’s imperative that they follow good data visualization design practices to ensure that the data being presented can be interpreted accurately. These steps can help maintain visual integrity in charts and other infographics.

Self-service BI best practices: 5 dos and don’ts
In this SearchCIO video, Wayfair’s Nathan Kollett enumerates the dos and don’t’s that make up self-service BI best practices.

Get the most out of your data, reap the benefits of BI tools
What do you do with all that enterprise data? Crunch, examine, explore, and contextualize the numbers, and experience the business benefits of BI tools.

New Qlik CEO Mike Capone outlines his business strategy
New Qlik CEO Mike Capone says the company has to tout its success stories more to stay relevant in a competitive self-service analytics market.

Expert: For BI, you must know the data integration process
Cloud, self-service and architecture are the focus as consultant Rick Sherman reviews pressing trends of the day. Top of all is the data integration process.

Trending Terms
statistical analysis
data mining
data mart
embedded BI
data governance
Qlik

Writing for Business
The user-training for the new business intelligence software was extensive, in the hopes that employees would be __________ by the change.
A. unphased
B. unfazed
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: