Word of the Day: Tech Definitions from WhatIs.com


January 10, 2018  2:54 AM

VoIP (voice over IP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony. Continued…

Quote of the Day

“To ensure proper identification and troubleshooting of VoIP-related issues, a business should consider a holistic approach to communications monitoring.” – Michael Brandenburg

Learning Center
Unified communications vendors continue consolidation carousel
The consolidation trend among unified communications vendors continues, as Polycom, Star2Star and West announce mergers and acquisitions.

The voice technology evolution: From analog to digital to VoIP
Editor Jean DerGurahian reflects on what voice technology used to mean for the phone call process and how quality standards remain the same today.

Network pros troubleshoot VoIP quality, reliability
The need for high VoIP quality keeps network managers focused on performance and reliability as they develop communication services.

The omnichannel contact center is now mandatory
The omnichannel contact center is becoming increasingly important. But voice communications is still the preferred channel for many consumers.

What are the requirements for E911 services for VoIP providers?
Learn the requirements to maintain E911 services and ensure the correct information is routed to the appropriate authorities during an emergency call.

Trending Terms
private branch exchange
IP telephony
endpoint device
WebRTC
real-time communications
UCaaS

Writing for Business
The _______ reason a company switches to VoIP is to save money.
a. principle
b. principal
Answer

January 9, 2018  8:43 PM

prime number

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A prime number is a whole number greater than 1 whose only factors are 1 and itself. A factor is a whole number that can be divided evenly into another number. Continued…

Quote of the Day

“The security of many encryption systems is based on mathematical problems involving prime numbers so large that the problems are prohibitively hard for attackers to solve.” – Michael Cobb

Learning Center
1024-bit encryption keys: How ‘trapdoored’ primes have caused insecurity
Attacks on 1024-bit encryption keys are now possible, with trapdoored primes being used for efficient decryption. Find out how they work.

Is “responsible encryption” the new answer to “going dark”?
“Responsible encryption” joins “going dark” as the FBI’s newest buzzword for lawful access to encrypted data as officials continue press for weakened crypto.

How to use data encryption tools and techniques effectively
This overview of data encryption tools and methods provides recommendations for protecting data at rest and in transit.

Risk & Repeat: Responsible encryption ramps up
This Risk & Repeat podcast discusses the U.S. government’s push for responsible encryption and what it means for the tech industry.

Following Equifax breach, CEO doesn’t know if data is encrypted
After the massive Equifax breach, the new CEO said in a congressional hearing that he doesn’t know whether the company has started to encrypt customer data

Trending Terms
supercomputer
Mersenne prime
Fermat prime
cryptology
RSA
Diffie-Hellman key exchange

Writing for Business
Many organizations don’t give encryption a thought until they suffer a data _______.
a. breach
b. breech
Answer


January 8, 2018  4:14 PM

SIEM

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Security information and event management (SIEM) is an approach to security management that combines SIM (security information management) and SEM (security event management) functions into one security management system. Continued…

Quote of the Day

“SIEM as a utility is the answer to enterprises’ questions about how to grow strategically at scale, while not compromising safety and soundness.” – A.N. Ananth

Learning Center
2018 prediction: Why that smart fish tank hack should have you swim to SIEM
Remember the smart fish tank hack in 2017? IoT attacks are sophisticated, and they’re here. Learn how SIEM as a utility can help keep your enterprise safe.

Is your fish tank listening? A roadmap to dipping your toes in the IoT waters
As enterprises adopt IoT devices and manufacturers develop enterprise tools, there is a shared responsibility to ensure data is fortified against attacks.

The tug of war between user behavior analysis and SIEM
User behavior analysis features appear in a range of information security technologies, and the trend is expected to continue.

How to find the best SIEM system for your company
Learn to locate the best SIEM system for your organization by reading this overview of the latest SIEM tech developments.

Will it last? The marriage between UBA tools and SIEM
In this issue of ‘Information Security’ magazine, we look at SIEM, UBA tools and considerations for effectively implementing user behavior analytics.

Trending Terms
security information management
correlation engine
PCI DSS
APT
user behavior analytics
security event

Writing for Business
The number of security holes found during the penetration test left _________ shaken.
a. the CSO and me
b. the CSO and I
c. the CSO and myself
Answer


January 5, 2018  5:40 PM

bang-bang control

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Bang-bang control is a type of control system that mechanically or electronically turns something on or off when a desired target (setpoint) has been reached. Continued…

Quote of the Day

“Even the way we control lights is changing as the simple on/off switch gives way to flexible control options through smartphones, touch panels and even voice control.” – Daniel Cooley

Learning Center
Growing pains of the internet of things
While slow to take off, enterprise and industrial IoT systems will break down barriers to innovation and communication that previously existed.

Ten tips for migrating to SCADA systems plus IoT
Uncover 10 critical steps enterprises must consider to successfully and securely update SCADA systems for IoT.

Industrial control systems a growing target for cyber attack
Attackers with increasing capabilities have strong financial motivation to go after critical infrastructure and manufacturing firms, says security industry expert.

What is the impact of the Siemens SCADA vulnerability?
Siemens SCADA vulnerabilities were discovered in their software products, allowing for local privilege escalation. Find out how to prevent the attacks.

Real-time vs. near-real-time analytics — how to choose
Everyone wants data, but are near-real-time analytics sufficient. Or does it have to be truly ‘real-time?’ Expert Tom Nolle walks through the cloud choices.

Trending Terms
control loop
control system
industrial control system
SCADA
distributed control system
programmable logic controller

Writing for Business
_______ are common in factory automation, building automation and material handling systems.
a. PLC’s
b. PLCs
Answer


January 4, 2018  5:38 PM

SD-WAN

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Software-defined WAN (SD-WAN) is a technology that distributes network traffic across wide area networks (WAN) that uses software-defined networking (SDN) concepts to automatically determine the most effective way to route traffic to and from branch offices and data center sites. Continued…

Quote of the Day

“Over time, SD-WAN will provide enhanced support for IoT, mobility — like Wi-Fi and 5G — and evolve toward the concept of the software-defined branch.” – Lee Doyle

Learning Center
Cloud culture calls for flexible networks
Cloud-based workloads demand more flexibility, so how can businesses rethink their WAN strategies to accommodate this.

SD-WAN 2.0: What SD-WAN trends to look for in 2018
SD-WAN technology will continue to mature in 2018, but here are some of the major SD-WAN trends to keep an eye out for in the future.

What are the top SD-WAN management concerns?
SD-WAN deployments are increasing, but IT pros still have concerns about SD-WAN management. Expert Lee Doyle addresses some of the most common issues.

SD-WAN explained: Getting your questions answered
Read this compilation of questions and answers about SD-WAN, explained by SearchSDN experts. And let us know what SD-WAN questions you have.

How does a managed SD-WAN service work?
Networking expert John Burke discusses managed SD-WAN services and why providers hope offering such services to customers will win them a piece of the SD-WAN pie.

Trending Terms
overlay network
WAN optimization
IPsec
MPLS
VoIP
hybrid WAN

Writing for Business
There are a number of methods you can use to capture VoIP calls ___ a LAN.
a. off
b. off of
Answer


January 3, 2018  5:35 PM

digital transformation (DX)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Digital transformation (DX) is the strategic use of technology and automation to dramatically change how businesses keep pace with changing customer expectations and economic conditions. Continued….

Quote of the Day

“A digital transformation initiative answers the need to interact with internal and external customers the way they want you to. That will require adopting and integrating new tools to transform the way a company operates.” – Dan Morris

Learning Center
Top IT guidance for CIOs in 2017 underscores urgency of digitization
Our top 10 IT guidance columns of 2017 point to the need for digital transformation and break down the steps CIOs need to take to accomplish it.

Your digital transformation initiative is probably not future-proof
Don’t embark on a digital transformation initiative until you’ve taken this readiness assessment quiz.

Five steps to enterprise digital transformation
Business leaders may recognize the importance of digital transformation, but as Software AG’s Kevin Niblock says, they are not so clear on how to enable it.

Digital transformation business: Procurement ripe for revitalization
As the digital transformation business moves into back-office operations, systems such as procurement may be among the candidates for renewal.

A look at digital transformation tools and strategies
Learn about digital transformation tools and techniques that can help enable digital transformation by overcoming roadblocks, such as legacy applications.

Trending Terms
supply chain
blockchain
Chief Digital Officer
digital enterprise
machine learning
omnichannel

Writing for Business
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
a. awhile
b. a while
Answer


January 2, 2018  9:26 PM

incident response

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Incident response is an organized approach to addressing and managing the aftermath of a security breach or cyberattack, also known as an IT incident, computer incident, or security incident. Continued…

Quote of the Day

“The incident response policy should be embedded in the hearts and minds of the response team via regular drills, practice and repetition — particularly including creative war-gaming exercises.” – Johna Till Johnson

Learning Center
How automated incident response can help security
Automated incident response could ease some of the current burden on security professionals. Here’s a look at how it helps.

Crafting a cybersecurity incident response plan, step by step
Is your cybersecurity incident response plan the best it can be? Follow the detailed and actionable guidance offered in this handbook, and it will be.

Make your incident response policy a living document
An incident response policy must be carefully devised, but also regularly updated, and always effectively communicated to all personnel.

IT incident response ditches root cause analysis process
IT incident response has evolved beyond the root cause analysis process with DevOps culture and highly complex distributed infrastructures.

Simple steps to improve the IT incident management process
An effective IT incident management process means ops teams can put out fires before they become infernos. You can refine efforts in three steps.

>Trending Terms
CSIRT
incident response plan
data breach
computer forensics
threat intelligence
vulnerability analysis

Writing for Business
Most major security breaches ____________ human error.
a. can be attributed to
b. are due to
Answer


December 27, 2017  9:21 PM

The 2017 Word of the Year is Blockchain!

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Blockchain is a type of distributed ledger for maintaining a permanent and tamper-proof record of transactional data. Continued…

Quote of the Day

“I predict that Blockchain will prove to be the architecture for machine-to-machine (M2M) transactions and allow a surprisingly diverse number of internet-connected devices to exchange currency autonomously, as well as data.” – Margaret Rouse

Learning Center
2018: The year blockchain, AI and IoT technology converge
Blockchain, AI and IoT will start working together in a seamless ecosystem, and the result is a more connected, more efficient and more secure world.

Blockchain for Dummies
In this excerpt from chapter five of ‘Blockchain for Dummies,’ author Tiana Laurence covers Ethereum, decentralized autonomous organizations and smart contracts.

Blockchain for IoT extends beyond ensuring security
Though often associated with security benefits, the use of blockchain for IoT extends far beyond keeping an IoT environment safe.

IT goals for 2018: Five CIO must-dos
There are a number of new and interesting technologies that deserve a look. We are looking at blockchain to overhaul our approach to identity management and data privacy.

CIO playbook for 2018: Leading analysts break down the trends
What’s in the 2018 CIO playbook? Ten leading analysts lay out the top issues: Read what they say about cloud consolidation, networks, API management and more.

Trending Terms
distributed ledger technology
digital currency
Bitcoin
consensus algorithm
alt coin
smart contract
programmable economy
machine-to-machine

Writing for Business
Our company is using Blockchain to document ____ funding for green initiatives.
a. its
b. it`s
c. its’
Answer


December 21, 2017  6:18 PM

huddle room

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A huddle room is a small and private meeting area that typically seats 3-6 people and is equipped with teleconferencing or other collaboration technologies. Continued…

Quote of the Day

“As companies shift to open-office floor plans, the need for huddle rooms increases so employees have a place to connect with colleagues and customers across the globe.” – David Maldow

Learning Center
Huddle room video conference costs don’t need to break the bank
Video conference costs range from free to thousands of dollars. When deploying video in huddle rooms, strike a balance between quality and affordability.

How do huddle rooms fit in video conferencing strategies
Huddle rooms are becoming an important piece in video conferencing strategies. But you can’t just equip a room with a simple camera and speakerphone.

Growing demand for video conferencing in huddle rooms
Vendors are rushing to meet the demand for low-cost video conferencing in huddle rooms. The small meeting places are growing in popularity among businesses.

New Lifesize video system focuses on huddle room market
Lifesize’s new product is the latest addition to the huddle room market, an area that should see healthy growth in the coming years.

Broadview unites meeting room systems with desktop, mobile users
Broadview Networks launched a video service that connects meeting room systems and desktop and mobile users, while InFocus released 4K display wall processors.

Trending Terms
two-pizza rule
teleconference
video conference
presence technology
virtual meeting room
unified communications

Writing for Business
In _______ to your meeting request, could we hold off until the first of the year?
a. regard
b. regards
Answer


December 20, 2017  6:15 PM

dark data

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Dark data is digital information that is not being used. Continued…

Quote of the Day

“AI has also proved effective at analyzing unstructured data, or ‘dark data,’ from social channels and other web interactions and providing an unprecedented understanding of customer behavior.” – Corinne Sklar

Learning Center
Understanding artificial intelligence for retail customers
Channel partners are finding opportunities to provide artificial intelligence for retail customers.

Deloitte report reveals the power of unstructured data analytics
A new report from Deloitte says businesses should follow the path to the dark side and double down on unstructured data analytics.

Unstructured data analysis gains importance for businesses
Unstructured data analysis has become an important area for companies, as industries move farther from paper-based processes and into more nontextual business content.

Ten analytics success stories in a nutshell
How are companies like Burberry, CVS, Coca-Cola and L’Oreal experiencing success with analytics? The Data Mill reports.

Big data systems shine light on neglected ‘dark data’
The processing power of Hadoop and other big data tools is making it more feasible for companies to tap into dark data, information that previously was left untouched in IT systems.

Trending Terms
dark post
dark webdark social
unstructured data
big data management
semi-structured data

Writing for Business
Information extraction is a process intended to pull meaningful data from noisy text without making _________ changes in the author`s intended meaning.
a. substantial
b. substantive
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: