Word of the Day: Tech Definitions from WhatIs.com


March 31, 2017  5:39 PM

data integrity

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Blockchain, Data integrity, Data Management

In data management, integrity is the assurance that digital information is uncorrupted and can only be accessed or modified by those authorized to do so. Integrity involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Continued…

Quote of the Day

“The interesting thing from a data management perspective is that blockchain provides a complete, immutable, historical record that everyone in the network agrees with.” – Stewart Bond

Learning Center
Blockchain data disruption growing, IDC analyst says
IDC’s Stewart Bond discusses the potential impact of blockchain data architectures. It’s early, but the technology could someday change data governance.

How data governance software helps ensure the integrity of your data
Data governance software, one facet of a data governance program, helps organizations manage and ensure the integrity of their growing volumes of data.

Blockchain startups signal new approaches to data integrity
The Bitcoin phenomenon is fueling widespread development. The blockchain mechanisms that secure the Bitcoin network hold promise for security applications, says Robert Richardson.

Predictive analytics tools hinge on good data, business expertise
Predictive analytics tools won’t take you very far unless you have the right data — and the right people — involved from the get-go.

Blockchain: An answer to governmental hacking concerns
In a world of evolving cyberthreats, how can governments protect data? Enter blockchain, a growing presence as we move further into the IoT age.

Trending Terms
blockchain
hashing
confidentiality, integrity and availability
database management system
data governance

Writing for Business
Data management is a broad area of study that ___________ many more specialized fields.
a. comprises
b. is comprised of
Answer

March 29, 2017  3:53 PM

certificate authority (CA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Certificate authority, Digital certificates

A certificate authority (CA) is a trusted entity that issues electronic documents that verify a digital entity’s identity on the Internet. Continued…

Quote of the Day

“Organizations that choose to operate their own certificate authority need to put in place physical as well as logical security controls to ensure the security and integrity of their root signing keys and certificates.” – Michael Cobb

Learning Center
Google considers options on Symantec certificate authority ‘failures’
Symantec certificate authority offers excuses in an attempt to fend off consequences for CA improprieties set to be imposed by Google’s Chromium team.

Google creates its own root certificate authority
Google launched its own root certificate authority but it is unclear if it will issue certificates only for Alphabet companies or third parties as well.

Trusted? Certificate authority risks and how to manage them
Can that CA be trusted? Certificate authority risks are many, but since there’s no avoiding SSL and TLS, at least for now. Here’s how to increase CA security.

IT pros don’t get cybersecurity risks around certificate authorities
Venafi believes a Black Hat survey that shows low understanding of certificate authorities could mean cybersecurity risks in the future.

Will Certificate Transparency solve certificate authority trust issues?
Issues involving certificate authority trust and certificate abuse are nothing new. Learn how Google’s Certificate Transparency proposal aims to detect and address these problems.

Trending Terms
digital certificate
PKI
virtual private network
man-in-the-middle attack
registration authority

Writing for Business
Ideally, digital certificates are ________ compatible with older browsers and operating systems, a concept known as ubiquity.
A. backwards
B. backward
Answer


March 28, 2017  4:14 PM

technical debt

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agile development, DevOps, Refactoring

In software development, technical debt is a metaphor equating Extreme Programming’s incremental, get-something-started approach with the acquisition of money through a loan. Continued…

Quote of the Day

“Doing things the quick-and-dirty way can create quick-and-dirty code snippets, which can add up to big technical debt across a large program.” – Christopher Tozzi

Learning Center
Five ways to reduce technical debt, rework costs in Agile, DevOps
Need to lower the cost of software development? The first step is to reduce technical debt, according to five experts.

Why technical debt management tops the list of developer pain points
“Demand for rapid app and microservices delivery makes technical debt management developers’ top pain point.

Tighten IT operations control with a DevOps feedback loop
DevOps adopters share how IT operations control benefits from DevOps feedback loops, as well as platform and application reduction.

What is meant by the term “technical debt”?
Agile expert Lisa Crispin explains what is meant by “technical debt” and how teams can address the resulting sub-standard code before it gets out of control.

Technical debt: What is it and why should CIOs care?
In this story, CIOs and senior managers will hear from three industry experts who explain what technical debt is, why it occurs and what leaders can do now to address this business risk.

Trending Terms
refactoring
tipping point
sunk-cost effect
DevOps
agile software development

Writing for Business
According to Mike Cohn, Agile planning ___________ change by recognizing that it will occur.
A. accommodates
B. accomodates
Answer


March 27, 2017  3:39 PM

Slack software

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Slack software is cloud-based collaboration software suite. Originally founded in 2009 as a chat tool for a now-defunct gaming technology, Slack has gained currency among enterprises and is broadening into a collaboration platform with capabilities beyond just messaging. Continued…

Quote of the Day

“Modern teams recognize the value that modern collaboration platforms bring to them through centralized communication and support of free-form and fluid interactions for users, while still having access to corporate data and apps.” – Reda Chouffani

Learning Center
Seven features to consider when picking enterprise collaboration tools
From integration to automation, there is a lot to deliberate when choosing enterprise collaboration tools. Here is a breakdown of what to consider.

Consider consolidating your collaboration features
As more unified communications platforms offer more collaboration features, businesses need to consider consolidating some services.

Team chat apps: Please talk amongst yourselves
Team chat apps such as Slack and Cisco Spark can play an important role in providing a sense of cohesion within organizations.

Slack vs. Microsoft Teams: Which is best for enterprise collaboration?
Both Slack and Microsoft Teams are trying to gain the upper hand among workers as the leading enterprise collaboration platform.

Why Slack collaboration catches on where others can’t
The Slack collaboration tool features fit many business users’ work processes and integrates with other apps.

Trending Terms
collaboration platform
enterprise collaboration
Yammer
Microsoft Teams
ChatOps

Writing for Business
Management chose Slack to encourage communication ________ the company’s marketing team and its sales team.
A. between
B. among
Answer


March 24, 2017  8:34 PM

Facebook cloning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Facebook, Identity theft, Social networking

Facebook cloning is a scam in which the attacker copies the profile picture of an authorized user, creates a new account using that person’s name and sends friend requests to people on the user’s list. Continued…

Quote of the Day

“Facebook accounts contain personal information that can be used to commit fraud. Facebook is attractive to fraudsters because of the high level of trust in the site.” – Warwick Ashford

Learning Center
How to reassess privacy settings in wake of Facebook cloaking issues
Facebook closed the security loophole of Facebook cloaking after researchers exposed the issue, but expert Nick Lewis discusses why users still need to control their social media security settings.

Social media attacks a growing concern for enterprises
Cybercriminals take advantage of social media users who overshare online. Learn how to protect yourself on social media sites from social media attacks.

Social networking best practices for preventing social network malware
Learn how social networking security best practices can help prevent data leaks and ward off social network malware to keep your enterprise safe.

Features fall short in Facebook enterprise social network Workplace
Facebook’s enterprise social network, Workplace, trails major rivals in features necessary to win corporate deals.

Why you should stop posting these five things on Facebook
This blog post explains five things you need to stop posting on Facebook for both professional and personal reasons.

Trending Terms
Facebook scam
social networking
social engineering
identity theft
sock puppet
disinformation

Writing for Business
I was annoyed when my friend shared the Facebook post about the dangers of microwave ovens, but he didn’t know any better. It was just a case of __________.
A. misinformation
B. disinformation
Answer


March 23, 2017  8:59 PM

embedded vision

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
drone, Embedded devices

Embedded vision is the integration of computer vision in machines that use algorithms to decode meaning from observing pixel patterns in images or video. Continued…

Quote of the Day

“Computer vision is still a relatively young field and exploring it is vital.” – Jason Corso

Learning Center
Delving into neural networks and deep learning
IT will soon use neural networks and deep learning to better manage the data center.

Will computer vision help France take a lead in AI?
There are signs that France could become a centre for artificial intelligence research and development.

Google snaps up startup in push to master computer vision
With its purchase of Moodstocks, a machine learning-based image recognition startup, Google keeps pushing into the next frontier — computer vision. Also: C-level exit at Microsoft.

Despite progress, the future of AI will require human assistance
The future of AI is promising, but the road to more human-like intelligence is a long one.

Embedded system applications present new challenges
Embedded system applications present project managers with a new territory of application development to tackle.

Trending Terms
neural net processor
machine vision
driverless car
embedded device
embedded system
drone

Writing for Business
Each of the appliances in the model kitchen ______________.
A. have embedded systems
B. has an embedded system
Answer


March 22, 2017  8:13 PM

adulting

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Work-life balance", Millennials

Adulting is the assumption of tasks, responsibilities and behaviors traditionally associated with normal grown-up life, along with the implication that the individual in question does not particularly identify as an adult and that acting as one does not come naturally. Continued…

Quote of the Day

“The primary drivers for every previous generation were money and status. For Millennials, it tends to be more relationships and experiences — that’s how they keep score.” – Scott Degraffenreid

Learning Center
Retaining Millennial employees: What you need to know
Are you committed to retaining your Millennial employees? Learn about the characteristics of Millennials and how CIOs can keep them happy and productive.

Rehab or Reject Problem Employees: When Technical Skills Aren’t Enough
CIOs have to deal with troublesome employees from time to time. Learn how to face the problem.

DevOps done right: Why work-life balance matters to digital transformation success
The DevOps practitioners warn enterprises about neglecting the health and well-being of the IT staff responsible for delivering their digital transformation projects.

Forget flex spending, Millennials want a flexible mobile device policy
Millennials are willing to pass over the almighty dollar for a flexible mobile device policy, but is IT ready to adjust to a bring-your-own-device world?

CompTIA recognizes millennials with new community group
CompTIA has announced the CompTIA Future Leaders, a new community targeting the millennial generation in the channel. Future Leaders is the tenth CompTIA community.

Trending Terms
Millennials
job hopper
downsizing
work-life balance
Results-Only Work Environment

Writing for Business
BYOD policies often illustrate a significant ________ between administrators and employees.
A. disconnect
B. disconnection
Answer


March 21, 2017  2:21 PM

programmatic advertising

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
"Marketing and Advertising"

Programmatic advertising is a system that automates the processes and transactions involved with purchasing and dynamically placing ads on websites or apps. Continued…

Quote of the Day

“Marketing and advertising are the sweet spots for big data, but those who serve up marketing insights and ad space will need to evolve to survive.” – Jack Vaughan

Learning Center
Marketing and advertising remain sweet spots for big data technology
Marketing and advertising are the sweet spots for big data, but those who serve them up will need to evolve to survive. Learn more about how marketers and advertisers use big data.

Technology advertisements that cross ethical, legal lines
With technology advertisements, it’s hard to tell fact from fiction, says technology and security consultant Kevin McDonald. Irresponsible claims may put lives at risk.

Open Your Marketing Mind to Context and Quality
This blog post warns marketers about perils of low-cost CPMs associated with programmatic advertising and lays out better ways to target audience through context.

Before You Leap, Understand the 4 Pillars of Intent-Based Marketing
This blog post addresses the landscape, challenges and solutions in the B2B IT intent data market and lays out 4 building blocks for intent-based marketing success.

Advertising terminology on the internet
This page provides brief definitions for the most commonly-used terms related to internet advertising, along with links to full definitions for many of the terms.

Trending Terms
real-time bidding
ad exchange
targeted ad
purchase intent
ad fraud
demand-side platform

Writing for Business
Optimizing an ad campaign once it’s been set up is incredibly important and is often something advertisers ________.
A. look over
B. overlook
Answer


March 20, 2017  8:17 PM

holistic security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Attack surface, iot security, Network security

Holistic security is an approach that seeks to integrate all the elements designed to safeguard an organization, considering them as a complex and interconnected system. The ultimate purpose of holistic security is continuous protection across all attack surfaces: the totality of all physical, software, network and human exposure. Continued…

Quote of the Day

“There are far too many technologies built to different standards and specifications by multiple vendors, making it impractical for one company to provide a holistic security solution alone.” – Sanjay Khatri

Learning Center
Holistic security for database-centric applications
In this exclusive video presentation, Nemertes Research Senior Vice President and Founding Partner Andreas Antonopoulos provides an executive overview of the security issues of securing database-centric applications and the key tactics essential to success.

What do we need to make IoT security a reality?
Security models for PCs and smartphones are not applicable to the Internet of Things, according to IoT security researcher Angela Orebaugh.

Holistic fraud reduction through customer security management
A holistic approach to fraud reduction by focusing on customer behavior across multiple channels would help banks fight fraud. Fraud reduction requires a holistic approach lacking in today’s fraud detection technology.

Prevent enterprise IoT security challenges with preparation
Knowing the risks of the Internet of Things and taking the proper precautions are critical to preventing enterprise IoT security challenges down the line.

IoT World reveals the Wild West of IoT standards
While many industry insiders are advocating interoperability among Internet of Things standards, the market is still fragmented and vertical-specific.

Trending Terms
attack surface
systems thinking
IoT security
vulnerability
SIEM
risk intelligence

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
A. flouting
B. flaunting
Answer


March 17, 2017  6:50 PM

Hawthorne effect

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Employee monitoring

The Hawthorne effect is a psychological phenomenon that produces an improvement in human behavior or performance as a result of increased attention from superiors, clients or colleagues. Continued…

Quote of the Day

“Just remember that you need to find a balance between ethics, best practices in monitoring and keeping your employees happy and productive.” – Gary Miliefsky

Learning Center
Best practices for employer monitoring of social media
Employer monitoring of social media should be covered in a social media policy for employees, explains IT security expert Joe Granneman in this security advice column.

IoT at work: How IoT empowers employee productivity
Deploying IoT in the workplace can improve employee productivity and employee satisfaction — a win for both management and the company as a whole.

Firms can monitor employees’ online chats, EU court rules
Human rights court says it is not unreasonable for employers to want to verify that staff are completing their professional tasks during working hours.

Employee monitoring: Is Big Brother a bad idea?
Employee monitoring can help protect intellectual property and keep an eye on employee activities, if it’s done properly. In this interview, expert Kevin Beaver of Principle Logic LLC talks about the dos and don’ts of employee monitoring.

Spyware vs. spyware: Employer and employee monitoring
What rights and responsibilities do employers and employees have when monitoring others’ use of company systems?

Trending Terms
social networking
employee productivity
human resource management
goldbricking
ROWE
employee monitoring

Writing for Business
Business activity monitoring provides an immediate real-time monitoring and _________ capability.
A. decisioning
B. decision-making
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: