Word of the Day: Tech Definitions from WhatIs.com

February 26, 2018  5:02 PM

VM sprawl

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively. Continued…

Quote of the Day

“The great irony of virtualization sprawl is that it threatens the consolidation benefits that make virtualization attractive and cost-effective in the first place.” – Stephen J. Bigelow

Learning Center
Control VM sprawl with the right management tools
In this two-part series on how to control VM sprawl, we take a look at how implementing policies and right-size provisioning can prevent resource waste.

Benefits of VMs include workload mobility and fast duplication
Benefits of VMs include server consolidation, increased utilization and faster recovery times after failure, but there are some disadvantages as well.

Manage containers in cloud computing to prevent sprawl, cut costs
Containers in cloud computing have improved portability, but like VMs, they are susceptible to sprawl. Use these deployment tips to protect your budget.

The function and importance of server virtualization management tools
Server virtualization management tools help highly virtualized infrastructures by providing visibility into their VMs and physical hosts.

The best ways to control virtual machine sprawl
Find out how to reclaim a data center that’s overrun with virtual machine sprawl. While daunting, with a little organizing and the right tools, it’s doable.

Trending Terms
golden image
virtual machine lifecycle management
server sprawl
VMware template
server consolidation
zombie VM

Writing for Business
Application streaming and virtualization can help you _______ greater network efficiency.
a. attain
b. obtai

February 23, 2018  4:27 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Lemmatization is the grouping together of different forms of the same word. Continued…

Quote of the Day

“NLP technology uses text and speech analytics to identify patterns in speech, a capability that can help businesses gain insight into how they can improve their products.” – Nicole Lewis

Learning Center
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.

Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.

AI in IT tools promises better, faster, stronger ops
Autonomous robots don’t lurk around every corner, but there is growing AI in IT operations, and it yields improved speed, accuracy, analysis and insight.

Natural language generation software making inroads in enterprises
Natural language generation software is gradually finding its way into enterprises as businesses look to deploy emerging artificial intelligence tools.

Natural language driving proliferation of FB Messenger
Natural language processing isn’t quite ready to pass the Turing test, but NLP bots using the technology are taking off.

Trending Terms
natural language understanding
search engine
natural language processing

Writing for Business
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
a. except
b. accept

February 22, 2018  4:08 PM

machine code

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Machine code, also known as machine language, is the elemental language of computers. Continued…

Quote of the Day

“Many applications are developed in programming languages that are not compiled to efficient machine code before deployment, but that are translated by an interpreter to machine code while the application runs.” – David Bicknell

Learning Center
Few own up to source code theft cybersecurity threats
Are you adequately protected against source code theft? Stealing trade secrets is often an inside job done by staffers about to change jobs.

Binary code scanners, like purchasing security vulnerability insurance
Learn why binary code scanners are critical to finding vulnerabilities in open source components and keeping the connected, IoT world safe.

Use APM tools to find app anomalies, wherever they occur
Applications built from hundreds of cloud services glued together with APIs benefit when developers use APM tools to root out hard-to-find bottlenecks.

Apple’s confidential iBoot source code leaked online
Apple’s iBoot source code was discovered on a public GitHub repository. The company has since ordered its removal, confirming the code’s legitimacy.

Obfuscation may prevent reverse engineering
Reverse engineering can reveal all of the source code in your .NET applications. Expert Dan Cornell recommends code obfuscation as a protective measure.

Trending Terms
reverse engineering
programming language generations
source code

Writing for Business
Open source describes any software whose source codes in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license

February 21, 2018  4:05 PM

validated learning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful. Continued…

Quote of the Day

“Instead of incorporating elaborate experiences for end users, it’s better to first enable basic IoT features and keep the system remotely upgradable for future enhancements.” – Sachin Kurlekar

Learning Center
Five ways IoT is transforming the manufacturing industry
Hitachi Vantara’s Greg Knieriemen offers five ways IoT will permanently change the manufacturing for the better, from improved operational efficiency to improving safety.

Social media key to future of learning and development
Signs are pointing to a future of learning and development that is collaborative, social and ongoing. Here’s what to know.

Comparing development methodologies: Agile vs. DevOps vs. Lean Startup
If comparing development methodologies is getting to be a bit much, expert Christopher Ward has the answer. Here’s his take on Agile, DevOps and Lean.

Learning culture critical to Agile success
A learning culture is critical to Agile software development success. It fosters innovation, focuses on problem solving and encourages team members to master new skills.

Agile principles, for IT and across the enterprise
Agile principles are pushing beyond the boundaries of IT and into the entire enterprise.

Trending Terms
scientific method
minimum viable product
product lifecycle
value stream mapping

Writing for Business
According to Mike Cohn, Agile planning ___________ change by recognizing that it will occur.
a. accommodates
b. accomodates

February 20, 2018  7:00 PM

Containers as a service (CaaS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider’s API calls or a web portal interface. Continued…

Quote of the Day

“Comparing virtualization to containers is a bit like comparing a tractor-trailer to a school bus. Both move things from place to place along a road, but each has specific uses through which it can drive the most value.” – David Linthicum

Learning Center
Container as a service providers compete with distinct strategies
Container as a service providers vie for users with the promise of smooth deployment and integrated tools, and, for customers, there is not always much choice.

Containerized applications and the portability dream
Containerized applications can make portability a more realistic scenario. But that doesn’t mean they are easy to deal with.

Comparing containers and VMs for multi-tenant apps
As people are getting enterprise-ready for Docker containers, it makes sense to compare the features of VMs versus containers for multi-tenant apps.

Manage containers in cloud with these four quick tips
Enterprises seek to solve their app portability issues with containers in cloud computing, but there’s no one-size-fits-all solution.

Words to go: Containers in cloud computing
Containers in cloud computing have become a commonly used technology for most enterprises. Study these key terms to expand your container knowledge.

Trending Terms
Infrastructure as a Service
Platform as a Service
Amazon EC2 Container Service
Google Kubernetes
Docker Swarm

Writing for Business
In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application’s computing needs.
a. less
b. fewer

February 16, 2018  6:56 PM

FIDO (Fast ID Online)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. Continued…

Quote of the Day

“FIDO brings substantial gains to users and businesses, which explains its rapid adoption where other initiatives have failed to displace the password.” – Michael Cobb

Learning Center
FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long-term solutions to the challenges of effective and secure authentication.

Advanced Protection Program: How has Google improved security?
The Google Advanced Protection Program enables individuals who are being targeted by malicious actors to add an additional layer of security to their accounts.

Password-free authentication: Figuring out FIDO
Will open FIDO standards for better interoperability of authentication technologies actually work? Here’s an update on the specifications as the first products ship.

What the FIDO specification means for multi-factor authentication
Enterprises and security pros should stay up to speed on the FIDO specification as a new authentication standard for many reasons, including freedom from passwords and greater security.

How to deal with identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Trending Terms
strong authentication
multifactor authentication
public key
biometric authentication
one-time password
strong password

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

February 15, 2018  9:27 PM

rugged DevOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Rugged DevOps is an approach to software development that places a priority on making sure code is secure before it gets to production. Continued…

Quote of the Day

“It’s possible to develop code that’s even more secure than before the move to DevOps if you approach DevOps and security properly.” – Johna Till Johnson

Learning Center
Salary snapshot: It’s a very good time to be a DevOps pro
Job postings — and salaries — for DevOps have never been higher. Employment trends expert Will Markow explains why now is the time to be a DevOps pro.

Totally automatic: Improve DevOps and security in three key steps
Combining DevOps and security is possible; learn three key steps in this article by Nemertes Research CEO Johna Till Johnson.

Use a rugged DevOps approach to boost cloud app security
When implementing DevOps, many organizations make security an afterthought. But an approach known as rugged DevOps can secure cloud apps throughout the entire development lifecycle.

Why your DevOps process should have security baked in
The DevOps process helps organizations develop new cloud applications more quickly and efficiently. But without an end-to-end security strategy, those apps could be at risk.

Incorporating security is the next step in the evolution of DevOps
The evolution of DevOps has led to security being incorporated into the product development process. Will DevSecOps live up to its promise?

Trending Terms
IT operations
lean software development
Agile Manifesto
continuous software development
penetration testing

Writing for Business
Successfully _______ a DevOps culture in a data center isn’t easy, but it brings great rewards.
a. adapting
b. adopting

February 14, 2018  9:21 PM

buffer overflow

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. Continued…

Quote of the Day

“A buffer overflow can be thought of as data that goes outside the bounds of a block of allocated memory to corrupt data, crash the program or allow the execution of malicious code.” – Daniel Allen

Learning Center
How did a Microsoft Equation Editor flaw put systems at risk?
A Microsoft Equation Editor vulnerability put systems at risk of compromise. Learn how the flaw worked and how enterprises can protect themselves.

How climate change threats can inform cybersecurity strategies
There are several parallels between climate-related threats to critical infrastructure and data risk. Can the connection help companies develop effective cybersecurity strategies?

How can attacks bypass ASLR protection on Intel chips?
Attackers can bypass ASLR protection and conduct local attacks on any platform due to an Intel chip flaw. Find out how to protect your enterprise.

Broadpwn flaw: How does the new iOS exploit compare?
A researcher at Google’s Project Zero developed an iOS exploit that mimics Broadpwn. Expert Kevin Beaver explains how it works.

How do code-reuse attacks bypass Windows 10 security features?
Code-reuse attacks use counterfeit object-oriented programming to bypass Windows 10 security features. Here’s a look at how that works and how to stop it.

Trending Terms
attack vector
Common Weakness Enumeration
integer overflow
address space layout randomization
stack overflow

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
a. flouting
b. flaunting

February 13, 2018  9:17 PM

browser extension

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A browser extension is a small software application that adds a capacity or functionality to a web browser. Continued…

Quote of the Day

“Browsers are most people’s windows to the digital world and browser vendors are constantly striving to make them faster and safer to maintain or capture market share.” – Michael Cobb

Learning Center
Grammarly browser extension flaw put users at risk
A Grammarly browser extension vulnerability enabled attackers to access all users’ text saved in the Grammarly Editor, Tavis Ormandy discovered.

Hijacked Chrome extensions infect millions of users
Eight hijacked Chrome extensions were used to infect more than four million users. Plus, Cloudflare ignites debate over freedom of speech, and more.

Google Chrome Enterprise Bundle pulls IT away from the Edge
Google’s release of the Chrome Enterprise Bundle gives users access to the most popular consumer web browser and IT the ability to better manage it.

Project Zero finds Cisco WebEx vulnerability in browser extensions
Project Zero discovered a Cisco WebEx vulnerability contained in browser extensions, which was quickly patched. But does the patch go far enough?

Vulnerable Adobe extension downloads covertly to Chrome
An Adobe extension with XSS flaw was secretly downloaded by 30 million Chrome users. Plus, Brian Krebs identifies Mirai creator; and more.

Trending Terms
content filtering
ad blocker
browser extension malware
browser hijacker
click fraud
black hat SEO

Writing for Business
_________ are often used in a taskbar or a browser tab to indicate longer titles than will fit.
a. Ellipses
b. Ellipsis
c. Ellipsises

February 12, 2018  9:14 PM

hyperscale computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Hyperscale computing is a distributed infrastructure that can quickly accommodate an increased demand for internet-facing and back-end computing resources without requiring additional physical space, cooling or electrical power. Continued…

Quote of the Day

“In order for IoT devices to become ubiquitous, they must be increasingly intelligent and, at the same time, low cost. That is the conundrum — product attributes that are in conflict with each other. The only solution is to amortize the cost of high-quality AI across many devices with centralized processing in hyperscale data centers.” – Rado Danilak

Learning Center
Can niche cloud players take on hyperscale cloud providers?
The fight to be one of the hyperscale cloud providers is winding down, but a few companies still want to get in the ring, despite uphill odds.

Inside a hyperscale data center
With a small team and thousands of servers, the hyperscale data center Facebook runs in Forest City, N.C. isn’t just a giant version of an enterprise data center.

The window to be a hyperscale cloud provider is closing
It takes a lot of money and know-how to be a hyperscale cloud provider, and IBM and Oracle are running out of time to join that list.

Learn efficiency lessons from hyperscale cloud providers
Hyperscale cloud providers know best when it comes to data center efficiency. IT pros should apply their models for automation, redundancy and more.

Enterprises mirror hyperscale data centers to build new infrastructure
Enterprises can save money and manage their networks more efficiently by borrowing techniques from hyperscale data centers of large cloud providers.

Software-based networking brings new automation perks, challenges
The benefits of network automation have been clearly demonstrated by the hyperscale cloud providers.

Trending Terms
hyperscale storage
software-defined networking
converged infrastructure
high performance computing
Artificial Intelligence as a Service (AIaaS)

Writing for Business
Organizations are using Web-based mechanisms to _________ towards cloud computing environments.
a. move incrementally
b. incrementally move

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: