Word of the Day: Tech Definitions from WhatIs.com

March 2, 2018  10:13 PM

federated identity management (FIM)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Federated identity management (FIM) is an arrangement that can be made among multiple enterprises to let subscribers use the same identification data to obtain access to the networks of all enterprises in the group. Continued…

Quote of the Day

“With identity federation, administrators don’t have to contend with many of the issues that come with balancing multi-domain access.” – Robert Sheldon

Learning Center
Explore the pros and cons of identity federation management
Identity federation management makes end users happy, but it can be complicated for IT teams. A thoughtful plan can ensure the transition is as smooth as possible.

How to deal with Identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Identity and access management strategy: Time to modernize?
Security expert Michael Cobb outlines why the identity and access management strategy of many firms might be due for updating and explains how to get started.

‘Federated’ identity and access management tools
Get expert guidance on ways to employ Active Directory Federation Services and AD Connector as identity and access management tools in the cloud.

Set up an identity and access management system for public cloud
An identity and access management system is critical to any cloud security strategy. Know what your provider offers, and create user groups carefully.

Trending Terms
onboarding and offboarding
identity management
identity and access-management
Active Directory Federation Services
single sign-on
AWS Security Token Service

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

March 1, 2018  7:29 PM

deep learning (deep neural network)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Deep learning is an aspect of artificial intelligence (AI) that is concerned with emulating the learning approach that human beings use to gain certain types of knowledge. Continued…

Quote of the Day

“Deep learning algorithms require experience to sharpen their recommendations, and big data provides them with exactly the fuel they need.” – Ed Burns

Learning Center
Deep learning algorithms power startup’s beauty database
Silicon Valley’s Proven Beauty proves that deep learning algorithms are not just for disrupting the auto industry or going to the moon.

Compare machine vs. deep learning services in the cloud
Machine and deep learning services are both categorized as AI, but they aren’t the same. Learn the differences, and which public cloud services are available.

Deep learning technologies evolving beyond human capacities
Artificial intelligence is growing at a rapid pace, going beyond the usual expectations from machines, able to recognize images and behavioral patterns.

Experts explain how to deploy deep learning in production
When deploying deep learning in production, experts say it’s important to take care of the basics, like model design and testing.

Deep learning vs. machine learning: The difference starts with data
While they may seem similar, there are some real differences in deep learning vs. machine learning that can affect analytics applications in businesses.

Trending Terms
predictive analytics
machine learning
predictive modeling
neural network
natural language processing
image recognition

Writing for Business
Some employees fear that computers will take over their jobs with the _______ of machine learning, but that is not the case.
a. raise
b. rise

February 28, 2018  5:15 PM

DNS redirection

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

DNS redirection was the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected. Continued…

Quote of the Day

“DNS is a mission-critical service for enterprises, and it is also a gold mine of valuable data for protecting your enterprise.” – Nick Lewis

Learning Center
How did OurMine hackers use DNS poisoning to attack WikiLeaks?
A WikiLeaks attack was recently exposed by the hacking group OurMine. Nick Lewis shares how the hackers used DNS poisoning to take over the web address.

Use PowerShell for help with DNS server management
With assistance from PowerShell, the IT staff can save time by building scripts for DNS server management and modifications to DNS records.

DNS functions remain vital, but must adapt as demands shift
DNS functions remain vital. However, the proliferation of devices, especially those that are IPv6-only, present a challenge to this network protocol.

Hospital network security: Recursive DNS lookups yield threat insight
One health system uses recursive DNS lookups and deep insight into threat intelligence to ensure hospital network security.

Don’t let IPv6 and IoT question the purpose of DNS
DNS challenges, from IPv6 to the complexities of IoT, must be overcome, since a smooth-functioning domain name system remains essential for networking.

Trending Terms
cache poisoning
DNS attack
DNS Security Extensions
MX record
404 status code

Writing for Business
Although ISPs promote DNS redirection as a service to customers, customers typically think the ISPs have _______ motives.
a. alterior
b. ulterior

February 27, 2018  4:05 PM

event-driven computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software. Continued…

Quote of the Day

“Users of event-driven computing services don’t need to think about provisioning and managing servers or application scalability in familiar, traditional ways to cloud users.” – Stephen J. Bigelow

Learning Center
How to evolve architecture with a reactive programming model
This article explains why and how the reactive programming model plays a key role in modernizing enterprise architecture.

IoT apps and event-driven computing reshape cloud services
Cloud providers have added new services to support IoT apps and event-driven computing. Explore the rise of these technologies and their impact on IT.

How application scalability works in event-driven vs. IaaS computing
Event-driven computing increases application scalability. Admins don’t have to provision resources, as serverless computing only implements code it needs on demand.

Working with event-driven compute resources
Event-driven compute platforms let businesses forgo the traditional model of app planning and management and rely on cloud resources on demand.

Event-driven applications drive next wave of IaaS evolution
Event-driven applications and web services have started to redefine the IaaS model, as major providers race to offer these more advanced features.

Trending Terms
event-driven architecture
ECA rule
serverless computing
event-driven application
AWS Lambda
If This Then That

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
a. irregardless
b. regardless

February 26, 2018  5:02 PM

VM sprawl

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively. Continued…

Quote of the Day

“The great irony of virtualization sprawl is that it threatens the consolidation benefits that make virtualization attractive and cost-effective in the first place.” – Stephen J. Bigelow

Learning Center
Control VM sprawl with the right management tools
In this two-part series on how to control VM sprawl, we take a look at how implementing policies and right-size provisioning can prevent resource waste.

Benefits of VMs include workload mobility and fast duplication
Benefits of VMs include server consolidation, increased utilization and faster recovery times after failure, but there are some disadvantages as well.

Manage containers in cloud computing to prevent sprawl, cut costs
Containers in cloud computing have improved portability, but like VMs, they are susceptible to sprawl. Use these deployment tips to protect your budget.

The function and importance of server virtualization management tools
Server virtualization management tools help highly virtualized infrastructures by providing visibility into their VMs and physical hosts.

The best ways to control virtual machine sprawl
Find out how to reclaim a data center that’s overrun with virtual machine sprawl. While daunting, with a little organizing and the right tools, it’s doable.

Trending Terms
golden image
virtual machine lifecycle management
server sprawl
VMware template
server consolidation
zombie VM

Writing for Business
Application streaming and virtualization can help you _______ greater network efficiency.
a. attain
b. obtai

February 23, 2018  4:27 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Lemmatization is the grouping together of different forms of the same word. Continued…

Quote of the Day

“NLP technology uses text and speech analytics to identify patterns in speech, a capability that can help businesses gain insight into how they can improve their products.” – Nicole Lewis

Learning Center
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.

Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.

AI in IT tools promises better, faster, stronger ops
Autonomous robots don’t lurk around every corner, but there is growing AI in IT operations, and it yields improved speed, accuracy, analysis and insight.

Natural language generation software making inroads in enterprises
Natural language generation software is gradually finding its way into enterprises as businesses look to deploy emerging artificial intelligence tools.

Natural language driving proliferation of FB Messenger
Natural language processing isn’t quite ready to pass the Turing test, but NLP bots using the technology are taking off.

Trending Terms
natural language understanding
search engine
natural language processing

Writing for Business
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
a. except
b. accept

February 22, 2018  4:08 PM

machine code

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Machine code, also known as machine language, is the elemental language of computers. Continued…

Quote of the Day

“Many applications are developed in programming languages that are not compiled to efficient machine code before deployment, but that are translated by an interpreter to machine code while the application runs.” – David Bicknell

Learning Center
Few own up to source code theft cybersecurity threats
Are you adequately protected against source code theft? Stealing trade secrets is often an inside job done by staffers about to change jobs.

Binary code scanners, like purchasing security vulnerability insurance
Learn why binary code scanners are critical to finding vulnerabilities in open source components and keeping the connected, IoT world safe.

Use APM tools to find app anomalies, wherever they occur
Applications built from hundreds of cloud services glued together with APIs benefit when developers use APM tools to root out hard-to-find bottlenecks.

Apple’s confidential iBoot source code leaked online
Apple’s iBoot source code was discovered on a public GitHub repository. The company has since ordered its removal, confirming the code’s legitimacy.

Obfuscation may prevent reverse engineering
Reverse engineering can reveal all of the source code in your .NET applications. Expert Dan Cornell recommends code obfuscation as a protective measure.

Trending Terms
reverse engineering
programming language generations
source code

Writing for Business
Open source describes any software whose source codes in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license

February 21, 2018  4:05 PM

validated learning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful. Continued…

Quote of the Day

“Instead of incorporating elaborate experiences for end users, it’s better to first enable basic IoT features and keep the system remotely upgradable for future enhancements.” – Sachin Kurlekar

Learning Center
Five ways IoT is transforming the manufacturing industry
Hitachi Vantara’s Greg Knieriemen offers five ways IoT will permanently change the manufacturing for the better, from improved operational efficiency to improving safety.

Social media key to future of learning and development
Signs are pointing to a future of learning and development that is collaborative, social and ongoing. Here’s what to know.

Comparing development methodologies: Agile vs. DevOps vs. Lean Startup
If comparing development methodologies is getting to be a bit much, expert Christopher Ward has the answer. Here’s his take on Agile, DevOps and Lean.

Learning culture critical to Agile success
A learning culture is critical to Agile software development success. It fosters innovation, focuses on problem solving and encourages team members to master new skills.

Agile principles, for IT and across the enterprise
Agile principles are pushing beyond the boundaries of IT and into the entire enterprise.

Trending Terms
scientific method
minimum viable product
product lifecycle
value stream mapping

Writing for Business
According to Mike Cohn, Agile planning ___________ change by recognizing that it will occur.
a. accommodates
b. accomodates

February 20, 2018  7:00 PM

Containers as a service (CaaS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider’s API calls or a web portal interface. Continued…

Quote of the Day

“Comparing virtualization to containers is a bit like comparing a tractor-trailer to a school bus. Both move things from place to place along a road, but each has specific uses through which it can drive the most value.” – David Linthicum

Learning Center
Container as a service providers compete with distinct strategies
Container as a service providers vie for users with the promise of smooth deployment and integrated tools, and, for customers, there is not always much choice.

Containerized applications and the portability dream
Containerized applications can make portability a more realistic scenario. But that doesn’t mean they are easy to deal with.

Comparing containers and VMs for multi-tenant apps
As people are getting enterprise-ready for Docker containers, it makes sense to compare the features of VMs versus containers for multi-tenant apps.

Manage containers in cloud with these four quick tips
Enterprises seek to solve their app portability issues with containers in cloud computing, but there’s no one-size-fits-all solution.

Words to go: Containers in cloud computing
Containers in cloud computing have become a commonly used technology for most enterprises. Study these key terms to expand your container knowledge.

Trending Terms
Infrastructure as a Service
Platform as a Service
Amazon EC2 Container Service
Google Kubernetes
Docker Swarm

Writing for Business
In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application’s computing needs.
a. less
b. fewer

February 16, 2018  6:56 PM

FIDO (Fast ID Online)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. Continued…

Quote of the Day

“FIDO brings substantial gains to users and businesses, which explains its rapid adoption where other initiatives have failed to displace the password.” – Michael Cobb

Learning Center
FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long-term solutions to the challenges of effective and secure authentication.

Advanced Protection Program: How has Google improved security?
The Google Advanced Protection Program enables individuals who are being targeted by malicious actors to add an additional layer of security to their accounts.

Password-free authentication: Figuring out FIDO
Will open FIDO standards for better interoperability of authentication technologies actually work? Here’s an update on the specifications as the first products ship.

What the FIDO specification means for multi-factor authentication
Enterprises and security pros should stay up to speed on the FIDO specification as a new authentication standard for many reasons, including freedom from passwords and greater security.

How to deal with identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Trending Terms
strong authentication
multifactor authentication
public key
biometric authentication
one-time password
strong password

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: