Word of the Day: Tech Definitions from WhatIs.com


March 12, 2018  8:35 PM

data sovereignty

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Data sovereignty is the concept that information which has been converted and stored in binary digital form is subject to the laws of the country in which it is located. Continued…

Quote of the Day

“Data sovereignty rules are often the deciding factor for whether a would-be entrepreneur decides to compete in a given market.” – Alex Barrett

Learning Center
FAQ: How is the Privacy Shield Framework being enforced?
In this SearchCompliance FAQ, learn about enforcement of the Privacy Shield Framework and why some privacy advocates claim the rules remain insufficient.

Is data sovereignty affected by my cloud provider’s location?
With a recent government ruling that Microsoft data stored in Ireland is subject to U.S. law, does data sovereignty vary depending on where your cloud provider stores its data?

Data center compliance teams face new privacy, sustainability rules
New data security laws, such as Privacy Shield, will prompt data center compliance teams to rethink their strategies and consider more outsourcing in 2017.

Data privacy in the spotlight with Privacy Shield, Microsoft
Companies conducting transatlantic business got some good news this month around data privacy, but plenty of questions remain unanswered following Privacy Shield and Microsoft’s win.

Examine data collection problems with big data, IoT in mind
Data collection problems can occur when IT doesn’t prepare for big data and IoT changes. Solve these issues and understand how to securely move data.

Trending Terms
Safe Harbor
Patriot Act
data residency
DWaaS
service level agreement
GDPR

Writing for Business
GDPR’s requirement for ‘privacy by design’ demands new approaches to customer __________ giving customers complete control over their data.
a. relationships, including
b. relationships including
Answer

March 9, 2018  8:32 PM

artificial personality (AP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An artificial personality (AP) is a collection of characteristics, tendencies and behavioral quirks assigned to a chatbot, digital assistant, robot or video game character. Continued…

Quote of the Day

“While AI-fueled assistants are popping up everywhere, from home assistants to internet retail sites, the ability to engage in a natural dialogue remains evasive.” – Ed Burns

Learning Center
AI experts advise developers on dev tools
Developers must keep up with advancements in AI, as a new generation of tools provides developers with advanced capabilities, a group of AI experts said.

Chatbot applications must get better at chatting to engage users
Today’s chatbot applications are good order takers, but tomorrow’s should be more conversational in order to be real game-changers, experts say.

To work for us, AI virtual assistants need to speak, see like humans
For AI virtual assistants to become truly useful, conversational technologies need to perfect a bot’s ability to see and hear, said Forrester’s Julie Ask.

Who’s talking? Conversational agent vs. chatbot vs. virtual assistant
IBM Watson VP and CTO Rob High explains the distinction between a chatbot, a conversational agent and a virtual assistant.

AI functionality limited today but could be a game-changer
Today’s limited and overhyped AI functionality could soon give way to technology that is truly transformative for enterprises.

Trending Terms
chatbot
digital assistant
Siri
Turing test
uncanny valley
Alexa Voice Services

Writing for Business
Because time is limited, please hold your questions ____ after the robot demonstration.
a. till
b. ’til
Answer


March 8, 2018  8:14 PM

private key

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

In cryptography, a private key (secret key) is a variable that is used with an algorithm to encrypt and decrypt code. Continued…

Quote of the Day

“Because anyone who steals a private key can sign executable code that would then be successfully verified by the electronic device, that key must remain secure.” – Ellen Muraskin

Learning Center
23,000 Symantec certificates revoked following leak of private keys
DigiCert had more than 20,000 Symantec certificates revoked after reseller partner Trustico exposed the certificates’ private keys.

Risk & Repeat: Trustico certificate drama a cause for concern
This Risk & Repeat podcast discusses the recent Trustico certificate drama, the massive certificate revocation it triggered and the questions it raises.

ROCA RSA flaw unveils secret keys on wide range of devices
The ROCA RSA vulnerability takes advantage of poor implementation by Infineon to undermine the security of encryption keys, affecting some popular products.

Embedded security for IoT lies in the chip
Embedded security for IoT gives connected devices the smarts they need to recognize rogue data or instructions before they execute.

Private encryption key sharing worrying but not new, say security experts
A study has revealed a 40% increase in the past year in the number of internet-connected devices using shared encryption certificates, highlighting that this security risk of mass hacking is growing.

Trending Terms
secret key algorithm
asymmetric cryptography
brute force cracking
stream cipher
block cipher
key exchange

Writing for Business
Many organizations don’t give encryption a thought until they suffer a data _______.
a. breach
b. breech
Answer


March 7, 2018  6:39 PM

synthetic data

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Synthetic data is information that’s artificially manufactured rather than generated by real-world events. Continued…

Quote of the Day

“Synthetic data can be valuable in situations where data is restricted, sensitive or subject to regulatory compliance.” – David Schatsky

Learning Center
Expert panel warns developers to beware of AI bias
Developers who build AI applications must be on the lookout for AI bias that seems to be inevitable in the current crop of systems.

Synthetic data could ease the burden of training data for AI models
Synthetic data is artificially manufactured training data designed to work as effectively as the real thing.

Big data throws big biases into machine learning data sets
Data bias in machine learning data sets is a big problem for AI, and correcting it is no small feat.

At AI World, ‘black cat’ problems and data mysteries abound
At the recent AI World event, Dun & Bradstreet’s Anthony Scriffignano explains why AI explorations are akin to searching for black cats in a dark room.

How to win in the AI era? For now, it’s all about the data
In today’s AI era, data is what will separate winners from losers in the race to exploit artificial intelligence, according to deep learning pioneer Andrew Ng.

Trending Terms
algorithmic accountability
deep learning
machine vision
data scientist
DevOps
machine learning

Writing for Business
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
a. raise
b. rise
Answer


March 6, 2018  6:31 PM

medical transcription software (MTS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Medical transcription software (MTS) is a specialized speech recognition program that includes a database of medical terminology. Continued…

Quote of the Day

“Recording transcripts allow users to see clearly who is speaking, when they spoke, and do an intelligent search by keywords.” – Roopam Jain

Learning Center
Blue Jeans integrates AI-powered transcription technology
Blue Jeans and Voicera partner to bring AI transcription technology to online meetings, while ZaiLab enters the U.S. cloud contact center market.

How to purchase, implement a medical speech recognition system
A medical speech recognition system can help health care facilities achieve meaningful use, thanks to digitized records. CIOs show how it’s done.

Mobile and IoT drive better outcomes in healthcare
Mobile devices and IoT technology are creating a seamless, secure experience for patients and healthcare organizations alike.

Automated transcription services could be integral to web conferencing
Zoom will let users automatically transcribe online meetings. More web conferencing vendors are expected to add automated transcription services soon.

A look at the leading medical imaging software on the market
Learn about the leading medical imaging software and how these products help blend old and new tech to promote collaborative healthcare environments.

Trending Terms
speech recognition
medical transcription
electronic health record
health IT
streaming sound

Writing for Business
The concept of electronic health records ______ interoperability.
a. implies
b. imply
Answer


March 5, 2018  10:18 PM

conversational user interface

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A conversational user interface is programming that allows a chatbot to communicate informally with a human end user. Continued…

Quote of the Day

“With this movement toward automated conversation, it could be debated that human-to-human interaction is becoming less important in sales.” – Jesse Scardina

Learning Center
When selling on social media, marketers weigh chatbots vs. humans
Deciding whether to have chatbots interact with customers or actual humans behind the keyboard for selling on social media depends on a number of variables.

Why voice interfaces remain challenging
While voice recognition is much improved and its place in IoT architectures is perceivable, it can still be hard to communicate.

IBM Watson CTO: A range of conversational technologies can coexist
When it comes to conversational technologies like chatbots and smarter AI agents, IBM Watson VP and CTO Rob High said there’s room for both in the enterprise.

AI chatbots augment humans working in contact centers
As AI chatbots start to infiltrate contact centers, human agents can still sleep soundly at night. Their jobs aren’t going anywhere yet.

Facebook Messenger chatbots follow HubSpot Motion AI acquisition
Facebook Messenger chatbots took center stage at Inbound, the annual customer HubSpot conference, after the company’s Motion AI acquisition.

Trending Terms
chatbot
call center agent
customer engagement
voice user interface
virtual assistant
Facebook Messenger

Writing for Business
Our data shows that a vast majority of customers prefer Brand A  ____ Brand B.
a. to
b. than
c. over
Answer


March 2, 2018  10:13 PM

federated identity management (FIM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group. Continued…

Quote of the Day

“With identity federation, administrators don’t have to contend with many of the issues that come with balancing multi-domain access.” – Robert Sheldon

Learning Center
Explore the pros and cons of identity federation management
Identity federation management makes end users happy, but it can be complicated for IT teams. A thoughtful plan can ensure the transition is as smooth as possible.

How to deal with Identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Identity and access management strategy: Time to modernize?
Security expert Michael Cobb outlines why the identity and access management strategy of many firms might be due for updating and explains how to get started.

‘Federated’ identity and access management tools
Get expert guidance on ways to employ Active Directory Federation Services and AD Connector as identity and access management tools in the cloud.

Set up an identity and access management system for public cloud
An identity and access management system is critical to any cloud security strategy. Know what your provider offers, and create user groups carefully.

Trending Terms
onboarding and offboarding
identity management
identity and access-management
Active Directory Federation Services
single sign-on
AWS Security Token Service

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


March 1, 2018  7:29 PM

deep learning (deep neural network)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Deep learning is an aspect of artificial intelligence (AI) that is concerned with emulating the learning approach that human beings use to gain certain types of knowledge. Continued…

Quote of the Day

“Deep learning algorithms require experience to sharpen their recommendations, and big data provides them with exactly the fuel they need.” – Ed Burns

Learning Center
Deep learning algorithms power startup’s beauty database
Silicon Valley’s Proven Beauty proves that deep learning algorithms are not just for disrupting the auto industry or going to the moon.

Compare machine vs. deep learning services in the cloud
Machine and deep learning services are both categorized as AI, but they aren’t the same. Learn the differences, and which public cloud services are available.

Deep learning technologies evolving beyond human capacities
Artificial intelligence is growing at a rapid pace, going beyond the usual expectations from machines, able to recognize images and behavioral patterns.

Experts explain how to deploy deep learning in production
When deploying deep learning in production, experts say it’s important to take care of the basics, like model design and testing.

Deep learning vs. machine learning: The difference starts with data
While they may seem similar, there are some real differences in deep learning vs. machine learning that can affect analytics applications in businesses.

Trending Terms
predictive analytics
machine learning
predictive modeling
neural network
natural language processing
image recognition

Writing for Business
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
a. raise
b. rise
Answer


February 28, 2018  5:15 PM

DNS redirection

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

DNS redirection was the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected. Continued…

Quote of the Day

“DNS is a mission-critical service for enterprises, and it is also a gold mine of valuable data for protecting your enterprise.” – Nick Lewis

Learning Center
How did OurMine hackers use DNS poisoning to attack WikiLeaks?
A WikiLeaks attack was recently exposed by the hacking group OurMine. Nick Lewis shares how the hackers used DNS poisoning to take over the web address.

Use PowerShell for help with DNS server management
With assistance from PowerShell, the IT staff can save time by building scripts for DNS server management and modifications to DNS records.

DNS functions remain vital, but must adapt as demands shift
DNS functions remain vital. However, the proliferation of devices, especially those that are IPv6-only, present a challenge to this network protocol.

Hospital network security: Recursive DNS lookups yield threat insight
One health system uses recursive DNS lookups and deep insight into threat intelligence to ensure hospital network security.

Don’t let IPv6 and IoT question the purpose of DNS
DNS challenges, from IPv6 to the complexities of IoT, must be overcome, since a smooth-functioning domain name system remains essential for networking.

Trending Terms
cache poisoning
DNS attack
DNS Security Extensions
CNAME
MX record
404 status code

Writing for Business
Although ISPs promote DNS redirection as a service to customers, customers typically think the ISPs have _______ motives.
a. alterior
b. ulterior
Answer


February 27, 2018  4:05 PM

event-driven computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software. Continued…

Quote of the Day

“Users of event-driven computing services don’t need to think about provisioning and managing servers or application scalability in familiar, traditional ways to cloud users.” – Stephen J. Bigelow

Learning Center
How to evolve architecture with a reactive programming model
This article explains why and how the reactive programming model plays a key role in modernizing enterprise architecture.

IoT apps and event-driven computing reshape cloud services
Cloud providers have added new services to support IoT apps and event-driven computing. Explore the rise of these technologies and their impact on IT.

How application scalability works in event-driven vs. IaaS computing
Event-driven computing increases application scalability. Admins don’t have to provision resources, as serverless computing only implements code it needs on demand.

Working with event-driven compute resources
Event-driven compute platforms let businesses forgo the traditional model of app planning and management and rely on cloud resources on demand.

Event-driven applications drive next wave of IaaS evolution
Event-driven applications and web services have started to redefine the IaaS model, as major providers race to offer these more advanced features.

Trending Terms
machine-to-machine
event-driven architecture
ECA rule
serverless computing
event-driven application
AWS Lambda
If This Then That

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
a. irregardless
b. regardless
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: