Word of the Day: Tech Definitions from WhatIs.com


February 6, 2018  7:06 PM

technology addiction

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games, despite negative consequences to the user of the technology. Continued…

Quote of the Day

“Increasingly, as social media opens up new ways to connect to existing and potential customers, it’s becoming more important to refresh customer engagement strategies — not just frequently, but on an ongoing basis.” – Scott Robinson

Learning Center
Customer relationship management tools revolutionize engagement
Customer relationship management tools that enhance customer engagement strategies fuel the rapidly evolving world of CRM.

The benefits of CRM tools go beyond traditional customer engagement
The right CRM tools can help organizations bolster client engagement in new ways, opening up convenient communication channels to the customer.

What key features do today’s leading social CRM tools offer?
Learn what to look for when purchasing social CRM tools, and discover which vendors offer must-have features that align with your business needs.

The four social media CRM best practices you should know
Here are the social media CRM best practices you should be following to create the best possible experience for your customers.

Optimizing content personalization for better digital experiences
Content personalization helps drive digital experiences and business through better customer engagement.

Trending Terms
reinforcement theory
customer engagement
social CRM
Facebook “Like” button
user engagement
CRM analytics

Writing for Business
The amount of money a customer invests in a service can reduce a company’s churn rate and increase the chances they’ll stick with around for the long ______.
A. haul
B. hall
Answer

February 5, 2018  6:49 PM

5G

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

5G is the coming fifth-generation wireless broadband technology based on the IEEE 802.11ac standard. Continued…

Quote of the Day

“This year, carriers like Verizon and AT&T are expanding 5G tests in cities across the U.S. and globally. Verizon is also showcasing its 5G development during the 2018 Winter Olympics.” – Jean DerGurahian

Learning Center
The sky’s the limit with 5G wireless communication
With 5G wireless communication on the way, enterprises look forward to new ways of doing business when 5G fixed and wireless broadband hit the market.

5G wireless technology influences telecom’s future
Telecom’s future depends on 5G wireless technology to help converge wireless and wireline services and infrastructure.’

AT&T 5G headed for 12 U.S. markets this year
AT&T plans to roll out 5G mobile services in a dozen U.S. markets by the end of the year. But details on the AT&T 5G services were not disclosed.

Promise of 5G wireless evolution dazzles, but is cost justified?
The 5G wireless evolution brings radical change to wired and wireless networking. But despite its promise, operators are looking at an orderly adoption, rather than a forklift upgrade.

New 5G wireless technology trials spark enterprise interest
Next-generation 5G wireless technology will offer faster speeds and increased capacity, and enterprises are planning for how to take advantage of it.

Trending Terms
wireless broadband
802.11ac
4G
LTE
pervasive computing
millimeter wave

Writing for Business
Their plan for public Wi-Fi is somewhat different __________ our plan for extending broadband access.
A. then
B. from
Answer


February 2, 2018  3:41 PM

OWASP

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. Continued…

Quote of the Day

“OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate and maintain web applications that can be trusted.” – Ernie Hayden

Learning Center
What the OWASP IoT security project means for device creation
The OWASP IoT security project aims to change the way developers and testers handle internet-connected devices. Find out how it aims to tackle IoT security.

OWASP Top Ten: Surviving in the cyber wilderness
The latest version of the OWASP Top Ten web application risks is much like previous versions, and that’s not a bad thing at all.

How to identify and address overlooked web security vulnerabilities
Critical web security vulnerabilities can be resolved with proper tools, scanning and tests. Find out how to identify the top overlooked issues.

Why old security threats to web applications remain today
Old security threats to web applications refuse to go away. So, web application security best practices must evolve to meet both these and the newest threats.

Resolve web security issues with advice from industry experts
This feature has fixes for pressing web security issues in applications and offers advice on how to develop web apps without sacrificing quality or safety.

Trending Terms
application lifecycle management
OWASP Top Ten
attack surface analysis
application security
error handling
denial-of-service attack (DoS)

Writing for Business
A Web application firewall (WAF) is able to detect and _____ new unknown attacks by watching for unfamiliar patterns in the traffic data.
A. avoid
B. prevent
Answer


February 1, 2018  3:39 PM

Windows Server Core

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Windows Server Core is a minimal installation option for the Windows Server operating system (OS). Continued…

Quote of the Day

“Some companies that want to implement Server Core will be content to use remote management, but PowerShell will unlock the full potential of this server OS deployment.” – Brian Kirsch

Learning Center
Server Core management remains a challenge for some
Server Core management requires some PowerShell expertise, but wizards that generate code can give admins a place to start in their scripting journey.

Navigate the pros and cons of Windows Server Core
Use Windows Server Core to reduce VM overhead, but be wary of increasing density of VMs per host, as that can lead to serious issues.

Configure a Server Core installation with the Server Configuration Tool
The Microsoft Server Configuration Tool, also known as Sconfig.cmd, performs initial configurations for a Server Core installation.

Server Core installation offers perks, challenges for IT
A Server Core installation runs Windows Server 2016 without a GUI, which reduces resource demands but can require new management skills for the IT staff.

How does Windows Nano Server differ from Windows Server Core?
Windows Nano Server is Microsoft’s attempt to develop a server OS that takes up fewer resources and should require less patching.

Trending Terms
GUI
Microsoft Nano Server
PowerShell
RSAT
Microsoft Windows Containers
Microsoft Hyper-V Manager

Writing for Business
If you’re not _______ well-versed in microservices and containers, you’re running at the back of the pack.
a. already
b. all ready
Answer


January 31, 2018  3:33 PM

hands-off infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Hands-off infrastructure management is the remote, automated administration of server, storage and network resources. Continued…

Quote of the Day

“Automated infrastructure management took a step forward with the emergence of AIOps monitoring tools that use machine learning to proactively identify infrastructure problems.” — Beth Pariseau

Learning Center
AIOps tools portend automated infrastructure management
Automated infrastructure management will soon become reality in DevOps shops as IT monitoring tools lay groundwork with new AIOps features.

Evaluate DCIM software and its impact on the data center
Discover the capabilities that an effective DCIM software system can bring to the data center and how buyers can evaluate these features.

When to consider converged infrastructure technologies
Converged infrastructure technologies can simplify a data center, but make sure you ask the right questions before deciding they are a proper fit.

Change management automation alters the face of network configuration
Manually configuring and managing network changes is a chore of the past, thanks to products that automate these tasks.

Brush up your cloud automation and orchestration skills
Cloud automation and orchestration are critical technologies that save IT shops time and money. Use these five tips to implement them correctly.

Trending Terms
infrastructure management
IT automation
robotic process automation
lights-out management
software robot
machine learning
remote hands

Writing for Business
The promise of automation is that people will need to work _____ hours.
a. fewer
b. less
Answer


January 17, 2018  3:07 AM

Transport Layer Security (TLS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. Continued…

Quote of the Day

“TLS and SSL have defined secure communications on the internet for decades. They enable everything from secure browsing to e-commerce to secure banking. Together, they are the backbone of the connected world.” – Ed Moyle

Learning Center
TLS 1.3: What it means for enterprise cloud use
TLS 1.3 is only in draft form right now, but it could potentially have a huge impact on cloud users and the monitoring controls they use.

HTTPS interception gets a bad rap; now what?
Should products intercept TLS connections to gain visibility into network traffic? Recent data on HTTPS interception, and U.S.-CERT, warn against it.

Official TLS 1.3 release date: Still waiting, and that’s OK
Protocol scrutiny is good for the upcoming TLS 1.3 update as the process continues to expose, and fix, problems.

TLS client authentication ensures secure IoT connection
An expert said TLS client authentication could be used to ensure better IoT security with the thousands of IoT devices coming to market.

Why do HTTPS interception tools weaken TLS security?
HTTPS interception can weaken TLS security, even though it is supposed to protect websites. Here’s a look at how that works and what to do about it.

Trending Terms
Secure Sockets Layer
backward compatible
Heartbleed
POODLE attack
OpenSSL
HTTPS

Writing for Business
Many organizations don’t give encryption a thought until they suffer a data _______.
a. breach
b. breech
Answer


January 16, 2018  3:04 AM

social graph

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A social graph is a diagram that illustrates interconnections among people, groups and organizations in a social network. Continued…

Quote of the Day

“Graph databases can store complex data about how things relate to each other. Social networks typically use this type of data structure.” – George Lawton

Learning Center
Three Amazon AI-based projects to get your dev team rolling
Amazon AI-based projects range from easy to difficult and involve many different kinds of data. Experiment with these services to further your AI skills.

Facebook search app boosts graph database architecture to the fore
Graph database technology can surpass relational databases in capturing networks of relationships, which is one reason Facebook turned to graph technology for its new Graph Search app.

Graph technology rivals take Amazon Neptune database in stride
Amazon’s Neptune database enters an area of graph technology that includes startups, as well as players long on the trail of a relational data alternative.

A look at the leading operational database management systems
Operational database management systems support the different data requirements of modern applications. Learn what the leading vendors offer.

SQL Server graph database tools map out data relationships
Microsoft added SQL Server graph database features in the 2017 release to streamline the processing and querying of data that can be mapped in graph form.

Trending Terms
social network
Apache Giraph
graph database
graph theory
Graph Search
key-value pair

Writing for Business
Some people join social networking sites but don’t ________ them often.
a. frequent
b. visit
Answer


January 12, 2018  3:01 AM

time series chart

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A time series chart, also called a times series graph or time series plot, is a data visualization tool that illustrates data points at successive intervals of time. Continued…

Quote of the Day

“Time-series monitoring tools include the open source project Prometheus, which is popular among Kubernetes shops, as well as commercial offerings from InfluxData and Wavefront, the latter of which VMware acquired last year.” – Beth Pariseau

Learning Center
Time-series monitoring tools give high-resolution view of IT
Time-series monitoring tools offer enterprise IT a more nuanced and multidimensional view of infrastructure than traditional tools.

Prometheus 2.0 tweaks Kubernetes monitoring, data storage
A rewritten storage engine in Prometheus 2.0 makes the open source utility more scalable and reliable for Kubernetes monitoring in production.

What are some basics for monitoring microservices?
Monitoring microservices deployments is an important task in the cloud. Amazon CloudWatch lets IT teams track performance and address issues using alarms or events.

Basho: why the IoT needs a time series database
NoSQL database company Basho is in update mode for its Riak TS product, which is now freely available on an open source basis — for free.

Log analysis tool keeps Washington Post news apps on time
A log analysis tool integration with AWS Lambda helps The Washington Post’s mobile app dev team stay on top of IT operations.

Trending Terms
fever chart
data visualization
advanced analytics
log management
database activity monitoring
sparkline

Writing for Business
The ability to visualize data is important now and will only become _______ in the future.
a. more so
b. moreso
Answer


January 11, 2018  2:57 AM

robotic process automation (RPA)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Robotic process automation (RPA) is the use of software with artificial intelligence (AI) and machine learning capabilities to handle high-volume, repeatable tasks that previously required humans to perform. These tasks can include queries, calculations and maintenance of records and transactions. Continued…

Quote of the Day

“RPA is part of a broader spectrum of automation that ranges from simple scripts and macros to still-emerging cognitive platforms that merge automation and artificial intelligence.” – John Moore

Learning Center
Master the seven key DevOps engineer skills for 2018
In 2018, new DevOps engineer skills, like mastering automation and IoT, are going to change what it means to work in a DevOps shop.

From blockchain to RPA: A look at cutting-edge tech and the enterprise
In this CIO Essential Guide, learn about four cutting-edge technologies that could give your company the upper hand over industry competitors.

‘Proof of value’ — not proof of concept — key to RPA technology
Companies interested in robotic process automation (RPA) technology get fixated on proving it works, not its business value. Here’s how to fix that.

What IT automation trends mean for the future of the shop
Tech has enabled everyone to be technical. What does that mean for the IT department? Here’s why IT automation trends are just the beginning of the changes.

CRM machine learning leaps forward, assisting process automation
Companies in communications, financial services and other verticals can benefit from CRM machine learning driving AI and analytics.

Trending Terms
machine learning
screen scraping
digital transformation
software robotics
robot economy
digital labor

Writing for Business
The promise of automation is that people will need to work _____ hours.
a. fewer
b. less
Answer


January 10, 2018  2:54 AM

VoIP (voice over IP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

VoIP (voice over IP) is the transmission of voice and multimedia content over Internet Protocol (IP) networks. VoIP historically referred to using IP to connect private branch exchanges (PBXs), but the term is now used interchangeably with IP telephony. Continued…

Quote of the Day

“To ensure proper identification and troubleshooting of VoIP-related issues, a business should consider a holistic approach to communications monitoring.” – Michael Brandenburg

Learning Center
Unified communications vendors continue consolidation carousel
The consolidation trend among unified communications vendors continues, as Polycom, Star2Star and West announce mergers and acquisitions.

The voice technology evolution: From analog to digital to VoIP
Editor Jean DerGurahian reflects on what voice technology used to mean for the phone call process and how quality standards remain the same today.

Network pros troubleshoot VoIP quality, reliability
The need for high VoIP quality keeps network managers focused on performance and reliability as they develop communication services.

The omnichannel contact center is now mandatory
The omnichannel contact center is becoming increasingly important. But voice communications is still the preferred channel for many consumers.

What are the requirements for E911 services for VoIP providers?
Learn the requirements to maintain E911 services and ensure the correct information is routed to the appropriate authorities during an emergency call.

Trending Terms
private branch exchange
IP telephony
endpoint device
WebRTC
real-time communications
UCaaS

Writing for Business
The _______ reason a company switches to VoIP is to save money.
a. principle
b. principal
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: