Word of the Day: Tech Definitions from WhatIs.com


March 26, 2018  7:16 PM

affective computing (emotion AI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Affective computing, also known as AC or emotion AI, is an area of study within cognitive computing and artificial intelligence that is concerned with gathering data from faces, voices and body language to measure and perhaps replicate human emotion. Continued…

Quote of the Day

“Gartner predicts emotion AI systems are becoming so sophisticated that by 2022, our personal devices will know more about our emotional states than our own family.” – Bridget Botelho

Learning Center
AI in healthcare spurs advanced uses such as emotional intelligence
AI in healthcare is spawning advanced applications, such as using data about emotion and socioeconomic conditions to personalize care and post-treatment.

IoT enhances customer engagement for brands and marketers
Enhanced IoT capabilities measure customer engagement, allowing businesses to develop richer profiles and create more effective marketing campaigns.

Consumer device boom heralds user interface innovation, says Gartner
Consumers will add more devices to their personal portfolio instead of consolidating, says analyst Gartner.

Beyond Verbal takes on emotions analytics in call centers and beyond
Emotional analytics software vendors say they can diagnose a speaker’s emotional state and make course corrections in settings like call centers.

AI technologies have come far, but the road is long
Machine learning is a black art that requires multiple PhDs, money and time but upcoming AI technologies tools could change that.

‘Intelligent tutoring systems’ use AI to boost student IQ
Carnegie Mellon University’s Ken Koedinger makes the case for an intelligent tutoring system in the classroom.

Trending Terms
human-computer interaction
speech recognition
gesture recognition
e-learning
biometrics
ambient intelligence
emotion analytics

Writing for Business
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
A. except
B. accept
Answer

March 23, 2018  8:51 PM

project scope

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Project scope is the part of project planning that involves determining and documenting a list of specific project goals, deliverables, tasks, costs and deadlines. Continued…

Quote of the Day

“Don’t pitch that a project will wrap up within an unrealistic timescale because you think that’s the proposal the business wants to hear. Eschew any major changes to the original project scope that could derail time and resource allotments — allow minor changes.” – Clive Longbottom

Trending Terms
feature creep
statement of work
change management
work breakdown structure
project management
gold plating
boil the ocean

Learning Center
Mobile projects: Here’s how to get them right the first time
Mobile projects are some of today’s toughest assignments. Expert Jennifer Lent explained what developers need to do differently.

Error budget instills reckless IT project management mindset
If an organization doesn’t quantify its IT risks, the allowable error budget could make some admins too cautious and others too reckless.

Nail an IT project proposal
Writing an IT project proposal shouldn’t be a technological exposé. Keep the focus on business benefit, cost and ROI to sway execs.

Avoid implementation failure with an effective change management plan
Implementing new enterprise technology or processes requires a comprehensive change management plan. Here’s how to create one.

How can a work breakdown structure help me with requirements?
A work breakdown structure is a way to make large efforts — like requirements gathering — more manageable. Expert Robin Goldsmith outlines the options.

Writing for Business
The following document section __________ the scope of the project.
a. will explain
b. explains
Answer


March 21, 2018  8:54 PM

network configuration management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Network configuration management is the process of organizing and maintaining information about all the components of a computer network. Continued…

Quote of the Day

“The most important step in a network configuration management strategy is to get started and build the proper mental model of the process.” – Terry Slattery

Learning Center
Take network configuration management tools to the next level
News forms of network configuration management tools, such as script management software and intent-based networking, reduce repetitive, time-consuming tasks.

Can container tools box out configuration management?
Container tools manage distributed systems without the help of general DevOps tools. If containers take over, DevOps might fade away.

The network configuration management strategy balancing act
Network automation will go smoother if you first devise a configuration management strategy. But where do manual configuration skills fit in?

IBN: Enablement for a configuration management process?
What is intent-based networking, and how can it help an organization streamline the network configuration management process?

Network configuration management tools could pave the way to SDN
Making the transition to SDN is tough, but network configuration management tools might be the way for IT administrators to take their first step.

Trending Terms
system administrator
change management
command line interface
SFTP
network automation
NETCONF

Writing for Business
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
a. was
b. were
Answer


March 20, 2018  6:57 PM

Amazon RDS

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Amazon Relational Database Service (Amazon RDS) is a managed SQL database service provided by Amazon Web Services (AWS). Continued…

Quote of the Day

“One of the advantages of developers using Amazon RDS instead of managing their own databases is that it reduces or eliminates their administrative responsibilities.” – Dan Sullivan

Learning Center
How Amazon RDS replication protects databases from failure
Amazon RDS replication enables developers to protect databases by syncing them up to backups in another AZ and managing failover in the event of a problem.

Advantages of Amazon RDS vs. a personal relational database
Using Amazon RDS reduces, or eliminates, the number of tasks developers face when they run their own database instance.

Amazon Aurora expands reach, but maybe not far enough
PostgreSQL support in Amazon Aurora lobs another volley in the database wars to lure Oracle customers to AWS, but it won’t win all enterprise workloads.

When should we run Oracle on EC2 vs. RDS?
AWS users can run Oracle on EC2, but Amazon RDS might be a fit for some enterprises. Administrators must also consider network performance and security needs.

Oracle vs. AWS battle heats up around cloud costs, databases
In the Oracle vs. AWS cloud battle, Amazon looks to reel in customers who are frustrated with lock-in and a lack of services and features.

Trending Terms
migration
cloud database
AWS Command Line Interface
MySQL
Amazon Aurora
graph database

Writing for Business
The AWS portfolio _____ more than 100 services, including those for compute, databases, infrastructure management, application development and security.
a. comprise
b. compose
Answer


March 19, 2018  6:51 PM

risk map

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. Continued…

Quote of the Day

“Risk mapping helps an organization identify the areas where it’s going to spend their security budget, how to implement solutions and, most importantly, helps identify specific instances of risk reduction.” – Mekhala Roy

Learning Center
Risk mapping key to security, business integration
Natixis’ Tom Kartanowicz explains why InfoSec should start talking to the business in the language of risk and the benefits of risk mapping.

Risk assessment procedure: How to keep it simple
A risk assessment procedure doesn’t need to be complicated to be effective — it only requires the right planning and follow through.

Entropy sources: How do NIST rules impact risk assessments?
New NIST guidelines highlight the importance of testing entropy sources during a risk assessment. Learn how this benefits the enterprise with Judith Myerson.

Freese: Cyber-risk management is the key to good infosec hygiene
Don Freese, deputy assistant director of the FBI, talked at the (ISC)2 Congress about the importance of cyber-risk management.

Digital risk management strategies for the data-centric business
As constantly growing data volumes increase information threats, companies are being forced to reexamine their approach digital risk management.

Trending Terms
data visualization
risk profile
risk assessment
enterprise risk management
heat map
inherent risk

Writing for Business
The risk assessment guidelines for school buses addressed traffic conditions _______ small and large vehicles interact at a range of speeds.
a. where
b. in which
Answer


March 16, 2018  4:47 PM

robotic process automation (RPA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform. Continued…

Quote of the Day

“When we talk about RPA, this is really digital labor in the truest sense, meaning, once you implement it, the virtual engineer will take care of it end to end.” – Gerson Benker

Learning Center
Robotic process automation software unites vendors, partners
As robotic process automation software deployments grow in sophistication, vendors are teaming with channel partners to tap the market opportunity.

‘Proof of value’ — not proof of concept — key to RPA technology
Companies interested in robotic process automation (RPA) technology get fixated on proving it works, not its business value. Here’s how to fix that.

What IT automation trends mean for the future of the shop
Tech has enabled everyone to be technical. What does that mean for the IT department? Here’s why IT automation trends are just the beginning of the changes.

How to create the best RPA architecture
Robotic process automation can be a key component of a digital transformation initiative. Here’s how to build an RPA architecture that delivers results.

Digital labor transforms IT, but not without careful prep
Carestream IT chief Gerson Benker talks about his experience with robotic process automation and how outsourcing experience helps when deploying digital labor.

Trending Terms
AI
machine learning
screen scraping
digital transformation
IT automation
supply chain management

Writing for Business
The promise of automation is that people will need to work _____ hours.
a. fewer
b. less
Answer


March 15, 2018  7:28 PM

operational intelligence (OI)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Operational intelligence (OI) is an approach to data analysis that enables decisions and actions in business operations to be based on real-time data as it’s generated or collected by companies. Continued…

strong>Quote of the Day

“Applying machine learning models close to the data in a database allows the operational intelligence to be readily shared among different downstream users.” – Mike Matchett

Learning Center
Why you need to design for analytics to succeed at IoT
Timely, reliable, accessible, trustworthy analytics is the future battlefield on which IoT wars will ultimately be won or lost.

Operational data store vs. data warehouse: How do they differ?
Considering operational data store vs. data warehouse platforms? It isn’t an either-or question. They serve different purposes in analytics architectures.

CA mainframe tools ante up with AI
CA Technologies laces AI and machine learning into its mainframe software tools to shore up data management, as the company straddles users’ evolving needs.

Integrated analytics gives users operational intelligence edge
Operational intelligence initiatives that integrate analytics into business processes can enable organizations to make better decisions on the fly, consultant David Loshin says.

SQL Server machine learning goes full throttle on operational data
As Microsoft invests in R and other technologies, SQL Server machine learning opens new analytics possibilities — that is, if IT shops can take advantage.

Trending Terms
real-time BI
advanced analytics
data visualization
IoT
self-service BI
predictive maintenance

Writing for Business
The user-training for the new business intelligence software was extensive, in the hopes that employees would be __________ by the change.
a. unphased
b. unfazed
Answer


March 14, 2018  6:48 PM

global deduplication

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Global deduplication is a method of preventing redundant data when backing up data to multiple deduplication devices. Continued….

Quote of the Day

“Because global deduplication solutions are specifically designed to address the scalability shortcomings of more traditional deduplication solutions, global deduplication tends to be implemented primarily in large data centers.” – Brien Posey

Learning Center
How does deduplication in cloud computing work and is it beneficial?
Implementing deduplication in cloud backup and storage can present challenges. A storage gateway may be the answer for your organization.

Complete guide to backup deduplication
Backup deduplication, which eliminates redundant data, has grown as a technology. Learn some of its most important aspects with this Essential Guide.

The copy data management market is starting to go mainstream
Products in the copy data management market gain traction as a way to protect production data and enable the use of data copies for DevOps and more.

Can you list some data compression technology pain points?
Data compression technology is a popular data reduction method, but only certain files and systems should undertake the process.

Object storage use cases coming to a data service near you
Expect to see more object storage use cases because of its ability to handle unstructured data sets via auto tagging, auto categorization and analytics.

Trending Terms
target deduplication
source deduplication
data deduplication ratio
load balancing
data deduplication hardware
compression

Writing for Business
If you don’t _______ your data effectively, you risk losing it.
a. backup
b. back up
Answer


March 13, 2018  8:37 PM

fault management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Fault management is the component of network management concerned with detecting, isolating and resolving problems. Continued…

Quote of the Day

“Operations teams must provide resilient, fault-tolerant systems — including mainframes — that can handle whatever the application code dishes out.” – Robert Crawford

Learning Center
Network fault management in today’s complex data centers
Network fault management takes new forms as new technologies and designs change the face of today’s modern networks. Here’s what you need to know to identify and troubleshoot faults in network designs and technologies.

Checklist to upgrade your network’s performance
When it’s time to upgrade your network performance, your checklist should include more than improved security and greater throughput.

Networking management: Are you equipped to face the future?
A data center network manager needs to be alert and ready for new challenges. This guide outlines what’s coming and how to keep data center operations flowing.

Enterprise network monitoring tools address companies of all sizes
The leading enterprise network monitoring tools are designed to monitor the performance and availability of devices on networks of all sizes.

Network management platforms address big enterprises, ISPs
Network management platforms monitor the availability and performance of applications and infrastructure for big enterprise and service-provider networks.

Trending Terms
FCAPS
uptime and downtime
network management system
fault tolerant
catastrophic failure
single point of failure

Writing for Business
The project impact analysis found that _______ RAID implementation increased the mean time between failures, there was greater fault tolerance.
a. because
b. since
Answer


March 12, 2018  8:35 PM

data sovereignty

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Data sovereignty is the concept that information which has been converted and stored in binary digital form is subject to the laws of the country in which it is located. Continued…

Quote of the Day

“Data sovereignty rules are often the deciding factor for whether a would-be entrepreneur decides to compete in a given market.” – Alex Barrett

Learning Center
FAQ: How is the Privacy Shield Framework being enforced?
In this SearchCompliance FAQ, learn about enforcement of the Privacy Shield Framework and why some privacy advocates claim the rules remain insufficient.

Is data sovereignty affected by my cloud provider’s location?
With a recent government ruling that Microsoft data stored in Ireland is subject to U.S. law, does data sovereignty vary depending on where your cloud provider stores its data?

Data center compliance teams face new privacy, sustainability rules
New data security laws, such as Privacy Shield, will prompt data center compliance teams to rethink their strategies and consider more outsourcing in 2017.

Data privacy in the spotlight with Privacy Shield, Microsoft
Companies conducting transatlantic business got some good news this month around data privacy, but plenty of questions remain unanswered following Privacy Shield and Microsoft’s win.

Examine data collection problems with big data, IoT in mind
Data collection problems can occur when IT doesn’t prepare for big data and IoT changes. Solve these issues and understand how to securely move data.

Trending Terms
Safe Harbor
Patriot Act
data residency
DWaaS
service level agreement
GDPR

Writing for Business
GDPR’s requirement for ‘privacy by design’ demands new approaches to customer __________ giving customers complete control over their data.
a. relationships, including
b. relationships including
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: