Word of the Day: Tech Definitions from WhatIs.com

February 14, 2018  9:21 PM

buffer overflow

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. Continued…

Quote of the Day

“A buffer overflow can be thought of as data that goes outside the bounds of a block of allocated memory to corrupt data, crash the program or allow the execution of malicious code.” – Daniel Allen

Learning Center
How did a Microsoft Equation Editor flaw put systems at risk?
A Microsoft Equation Editor vulnerability put systems at risk of compromise. Learn how the flaw worked and how enterprises can protect themselves.

How climate change threats can inform cybersecurity strategies
There are several parallels between climate-related threats to critical infrastructure and data risk. Can the connection help companies develop effective cybersecurity strategies?

How can attacks bypass ASLR protection on Intel chips?
Attackers can bypass ASLR protection and conduct local attacks on any platform due to an Intel chip flaw. Find out how to protect your enterprise.

Broadpwn flaw: How does the new iOS exploit compare?
A researcher at Google’s Project Zero developed an iOS exploit that mimics Broadpwn. Expert Kevin Beaver explains how it works.

How do code-reuse attacks bypass Windows 10 security features?
Code-reuse attacks use counterfeit object-oriented programming to bypass Windows 10 security features. Here’s a look at how that works and how to stop it.

Trending Terms
attack vector
Common Weakness Enumeration
integer overflow
address space layout randomization
stack overflow

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
a. flouting
b. flaunting

February 13, 2018  9:17 PM

browser extension

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A browser extension is a small software application that adds a capacity or functionality to a web browser. Continued…

Quote of the Day

“Browsers are most people’s windows to the digital world and browser vendors are constantly striving to make them faster and safer to maintain or capture market share.” – Michael Cobb

Learning Center
Grammarly browser extension flaw put users at risk
A Grammarly browser extension vulnerability enabled attackers to access all users’ text saved in the Grammarly Editor, Tavis Ormandy discovered.

Hijacked Chrome extensions infect millions of users
Eight hijacked Chrome extensions were used to infect more than four million users. Plus, Cloudflare ignites debate over freedom of speech, and more.

Google Chrome Enterprise Bundle pulls IT away from the Edge
Google’s release of the Chrome Enterprise Bundle gives users access to the most popular consumer web browser and IT the ability to better manage it.

Project Zero finds Cisco WebEx vulnerability in browser extensions
Project Zero discovered a Cisco WebEx vulnerability contained in browser extensions, which was quickly patched. But does the patch go far enough?

Vulnerable Adobe extension downloads covertly to Chrome
An Adobe extension with XSS flaw was secretly downloaded by 30 million Chrome users. Plus, Brian Krebs identifies Mirai creator; and more.

Trending Terms
content filtering
ad blocker
browser extension malware
browser hijacker
click fraud
black hat SEO

Writing for Business
_________ are often used in a taskbar or a browser tab to indicate longer titles than will fit.
a. Ellipses
b. Ellipsis
c. Ellipsises

February 12, 2018  9:14 PM

hyperscale computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Hyperscale computing is a distributed infrastructure that can quickly accommodate an increased demand for internet-facing and back-end computing resources without requiring additional physical space, cooling or electrical power. Continued…

Quote of the Day

“In order for IoT devices to become ubiquitous, they must be increasingly intelligent and, at the same time, low cost. That is the conundrum — product attributes that are in conflict with each other. The only solution is to amortize the cost of high-quality AI across many devices with centralized processing in hyperscale data centers.” – Rado Danilak

Learning Center
Can niche cloud players take on hyperscale cloud providers?
The fight to be one of the hyperscale cloud providers is winding down, but a few companies still want to get in the ring, despite uphill odds.

Inside a hyperscale data center
With a small team and thousands of servers, the hyperscale data center Facebook runs in Forest City, N.C. isn’t just a giant version of an enterprise data center.

The window to be a hyperscale cloud provider is closing
It takes a lot of money and know-how to be a hyperscale cloud provider, and IBM and Oracle are running out of time to join that list.

Learn efficiency lessons from hyperscale cloud providers
Hyperscale cloud providers know best when it comes to data center efficiency. IT pros should apply their models for automation, redundancy and more.

Enterprises mirror hyperscale data centers to build new infrastructure
Enterprises can save money and manage their networks more efficiently by borrowing techniques from hyperscale data centers of large cloud providers.

Software-based networking brings new automation perks, challenges
The benefits of network automation have been clearly demonstrated by the hyperscale cloud providers.

Trending Terms
hyperscale storage
software-defined networking
converged infrastructure
high performance computing
Artificial Intelligence as a Service (AIaaS)

Writing for Business
Organizations are using Web-based mechanisms to _________ towards cloud computing environments.
a. move incrementally
b. incrementally move

February 7, 2018  7:01 PM

cloud ecosystem

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services. Continued…

Quote of the Day

“Success in the cloud market depends on a strong partner ecosystem, as long you have a clearly defined value-add.” – Jeffrey Kaplan

Learning Center
Cloud computing: Ecosystem challenges and how to navigate them
Cloud computing ecosystem challenges range from finding suitable partners to understanding cloud vendor and ISV technical roadmaps.

Cloud management platforms offer a unified approach to hybrid IT
Cloud management platforms facilitate hybrid and multicloud management with centralized control — but first, look for these four crucial features.

How cloud computing platforms fuel digital transformation
Digital transformation strategies promise to leverage cloud computing platforms, as software developers converge on JavaOne and Oracle OpenWorld.

SaaS ecosystem partners reshape the channel’s competitive landscape
Channel firms will see increasing competition from nontraditional players, such as SaaS ecosystem partners and digital marketing agencies, CompTIA said.

How to get started in cloud service company transitions
The cloud computing business model is the latest in a series of daunting transitions for channel partners and one that offers a multidimensional puzzle.

Trending Terms
cloud services
business model

Writing for Business
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
A. separate
B. seperate

February 6, 2018  7:06 PM

technology addiction

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video games, despite negative consequences to the user of the technology. Continued…

Quote of the Day

“Increasingly, as social media opens up new ways to connect to existing and potential customers, it’s becoming more important to refresh customer engagement strategies — not just frequently, but on an ongoing basis.” – Scott Robinson

Learning Center
Customer relationship management tools revolutionize engagement
Customer relationship management tools that enhance customer engagement strategies fuel the rapidly evolving world of CRM.

The benefits of CRM tools go beyond traditional customer engagement
The right CRM tools can help organizations bolster client engagement in new ways, opening up convenient communication channels to the customer.

What key features do today’s leading social CRM tools offer?
Learn what to look for when purchasing social CRM tools, and discover which vendors offer must-have features that align with your business needs.

The four social media CRM best practices you should know
Here are the social media CRM best practices you should be following to create the best possible experience for your customers.

Optimizing content personalization for better digital experiences
Content personalization helps drive digital experiences and business through better customer engagement.

Trending Terms
reinforcement theory
customer engagement
social CRM
Facebook “Like” button
user engagement
CRM analytics

Writing for Business
The amount of money a customer invests in a service can reduce a company’s churn rate and increase the chances they’ll stick with around for the long ______.
A. haul
B. hall

February 5, 2018  6:49 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

5G is the coming fifth-generation wireless broadband technology based on the IEEE 802.11ac standard. Continued…

Quote of the Day

“This year, carriers like Verizon and AT&T are expanding 5G tests in cities across the U.S. and globally. Verizon is also showcasing its 5G development during the 2018 Winter Olympics.” – Jean DerGurahian

Learning Center
The sky’s the limit with 5G wireless communication
With 5G wireless communication on the way, enterprises look forward to new ways of doing business when 5G fixed and wireless broadband hit the market.

5G wireless technology influences telecom’s future
Telecom’s future depends on 5G wireless technology to help converge wireless and wireline services and infrastructure.’

AT&T 5G headed for 12 U.S. markets this year
AT&T plans to roll out 5G mobile services in a dozen U.S. markets by the end of the year. But details on the AT&T 5G services were not disclosed.

Promise of 5G wireless evolution dazzles, but is cost justified?
The 5G wireless evolution brings radical change to wired and wireless networking. But despite its promise, operators are looking at an orderly adoption, rather than a forklift upgrade.

New 5G wireless technology trials spark enterprise interest
Next-generation 5G wireless technology will offer faster speeds and increased capacity, and enterprises are planning for how to take advantage of it.

Trending Terms
wireless broadband
pervasive computing
millimeter wave

Writing for Business
Their plan for public Wi-Fi is somewhat different __________ our plan for extending broadband access.
A. then
B. from

February 2, 2018  3:41 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

The Open Web Application Security Project (OWASP) is a not-for-profit group that helps organizations develop, purchase, and maintain software applications that can be trusted. Continued…

Quote of the Day

“OWASP is an open community dedicated to enabling organizations to conceive, develop, acquire, operate and maintain web applications that can be trusted.” – Ernie Hayden

Learning Center
What the OWASP IoT security project means for device creation
The OWASP IoT security project aims to change the way developers and testers handle internet-connected devices. Find out how it aims to tackle IoT security.

OWASP Top Ten: Surviving in the cyber wilderness
The latest version of the OWASP Top Ten web application risks is much like previous versions, and that’s not a bad thing at all.

How to identify and address overlooked web security vulnerabilities
Critical web security vulnerabilities can be resolved with proper tools, scanning and tests. Find out how to identify the top overlooked issues.

Why old security threats to web applications remain today
Old security threats to web applications refuse to go away. So, web application security best practices must evolve to meet both these and the newest threats.

Resolve web security issues with advice from industry experts
This feature has fixes for pressing web security issues in applications and offers advice on how to develop web apps without sacrificing quality or safety.

Trending Terms
application lifecycle management
attack surface analysis
application security
error handling
denial-of-service attack (DoS)

Writing for Business
A Web application firewall (WAF) is able to detect and _____ new unknown attacks by watching for unfamiliar patterns in the traffic data.
A. avoid
B. prevent

February 1, 2018  3:39 PM

Windows Server Core

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Windows Server Core is a minimal installation option for the Windows Server operating system (OS). Continued…

Quote of the Day

“Some companies that want to implement Server Core will be content to use remote management, but PowerShell will unlock the full potential of this server OS deployment.” – Brian Kirsch

Learning Center
Server Core management remains a challenge for some
Server Core management requires some PowerShell expertise, but wizards that generate code can give admins a place to start in their scripting journey.

Navigate the pros and cons of Windows Server Core
Use Windows Server Core to reduce VM overhead, but be wary of increasing density of VMs per host, as that can lead to serious issues.

Configure a Server Core installation with the Server Configuration Tool
The Microsoft Server Configuration Tool, also known as Sconfig.cmd, performs initial configurations for a Server Core installation.

Server Core installation offers perks, challenges for IT
A Server Core installation runs Windows Server 2016 without a GUI, which reduces resource demands but can require new management skills for the IT staff.

How does Windows Nano Server differ from Windows Server Core?
Windows Nano Server is Microsoft’s attempt to develop a server OS that takes up fewer resources and should require less patching.

Trending Terms
Microsoft Nano Server
Microsoft Windows Containers
Microsoft Hyper-V Manager

Writing for Business
If you’re not _______ well-versed in microservices and containers, you’re running at the back of the pack.
a. already
b. all ready

January 31, 2018  3:33 PM

hands-off infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Hands-off infrastructure management is the remote, automated administration of server, storage and network resources. Continued…

Quote of the Day

“Automated infrastructure management took a step forward with the emergence of AIOps monitoring tools that use machine learning to proactively identify infrastructure problems.” — Beth Pariseau

Learning Center
AIOps tools portend automated infrastructure management
Automated infrastructure management will soon become reality in DevOps shops as IT monitoring tools lay groundwork with new AIOps features.

Evaluate DCIM software and its impact on the data center
Discover the capabilities that an effective DCIM software system can bring to the data center and how buyers can evaluate these features.

When to consider converged infrastructure technologies
Converged infrastructure technologies can simplify a data center, but make sure you ask the right questions before deciding they are a proper fit.

Change management automation alters the face of network configuration
Manually configuring and managing network changes is a chore of the past, thanks to products that automate these tasks.

Brush up your cloud automation and orchestration skills
Cloud automation and orchestration are critical technologies that save IT shops time and money. Use these five tips to implement them correctly.

Trending Terms
infrastructure management
IT automation
robotic process automation
lights-out management
software robot
machine learning
remote hands

Writing for Business
The promise of automation is that people will need to work _____ hours.
a. fewer
b. less

January 17, 2018  3:07 AM

Transport Layer Security (TLS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Transport Layer Security (TLS) is a protocol that provides privacy and data integrity between two communicating applications. Continued…

Quote of the Day

“TLS and SSL have defined secure communications on the internet for decades. They enable everything from secure browsing to e-commerce to secure banking. Together, they are the backbone of the connected world.” – Ed Moyle

Learning Center
TLS 1.3: What it means for enterprise cloud use
TLS 1.3 is only in draft form right now, but it could potentially have a huge impact on cloud users and the monitoring controls they use.

HTTPS interception gets a bad rap; now what?
Should products intercept TLS connections to gain visibility into network traffic? Recent data on HTTPS interception, and U.S.-CERT, warn against it.

Official TLS 1.3 release date: Still waiting, and that’s OK
Protocol scrutiny is good for the upcoming TLS 1.3 update as the process continues to expose, and fix, problems.

TLS client authentication ensures secure IoT connection
An expert said TLS client authentication could be used to ensure better IoT security with the thousands of IoT devices coming to market.

Why do HTTPS interception tools weaken TLS security?
HTTPS interception can weaken TLS security, even though it is supposed to protect websites. Here’s a look at how that works and what to do about it.

Trending Terms
Secure Sockets Layer
backward compatible
POODLE attack

Writing for Business
Many organizations don’t give encryption a thought until they suffer a data _______.
a. breach
b. breech

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: