Word of the Day: Tech Definitions from WhatIs.com

November 9, 2017  7:27 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

NVMe (non-volatile memory express) is a host controller interface and storage protocol created to accelerate the transfer of data between enterprise and client systems and solid-state drives (SSDs) over a computer’s high-speed Peripheral Component Interconnect Express (PCIe) bus. Continued…

Quote of the Day

“For enterprises seeking to get the most out of flash storage, an investment in NVMe technology is becoming a foregone conclusion.” – Scott Sinclair

Learning Center
Are you ready for NVMe storage and the future of flash?
Flash storage shifts the bottleneck to the storage network. NVMe storage technology and NVMe over Fabrics promise to address this problem.

Looking at NVMe storage technologies today and tomorrow
NVMe storage uses the fast NVMe connection protocol and flash-based SSDs. This guide outlines reasons why it might be the right choice for you.

The present and likely future of the NVMe protocol
Data speed in and out of SSDs led to the development of the NVMe protocol. Enterprises quickly saw the value in extending NVMe to storage networks.

How NVMe over Fabrics will change the storage environment
NVMe over Fabrics for high-end networking and the NVMe protocol replacing SCSI and SAS connectivity will each find a place in the data center.

NVMe flash array startups Pavilion Data, Vexata jump in
Most enterprises don’t yet need the performance of an NVMe flash array, but that hasn’t stopped startups from launching new storage products.

Trending Terms
nonvolatile storage
solid-state drive
3D XPoint
NVMe over Fabrics

Writing for Business
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic

November 8, 2017  8:56 PM

black hat

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Black hat refers to a hacker who breaks into a computer system or network with malicious intent. Continued…

Quote of the Day

“Criminal hackers know they must do what they can to test the limits of your application environment, while at the same time, flying under the radar.” – Kevin Beaver

Learning Center
Applying a hacker mindset to application security
Applying a hacker mindset to enterprise security operations can help spot overlooked weaknesses and vulnerabilities. Here’s how.

New cybersecurity report gets the hacker perspective
A cybersecurity report used a hacker survey to detail how adversaries think about attacking enterprise and how to best secure an environment.

Stamos preaches defensive security research in Black Hat keynote
Black Hat 2017 kicked off with Facebook’s Alex Stamos preaching the importance of defensive security research and community diversity.

What are the pros and cons of hiring an ex-hacker?
Hiring an ex-hacker can boost an enterprise’s security stature, but doing so comes with its own risks. Here are the pros and cons of hiring ex-hackers.

Dark web markets’ shutdown may lead to more arrests
The shutdown of AlphaBay and Hansa dark web markets leads to potential data on hundreds or thousands of site vendors and users.

Trending Terms
white hat
ethical hacker
penetration testing
vulnerability analysis
bug bounty program

Writing for Business
Ethical hacking is also known as penetration testing, intrusion ____________.
a. testing, and red teaming
b. testing and red teaming

November 7, 2017  8:50 PM

business continuity plan (BCP)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Business Continuity

A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue operating during an unplanned event. Continued…

Quote of the Day

“To get the most out of your business continuity plan, you should integrate its upkeep into your daily operations and activities.” – Paul Kirvan

Learning Center
Sample business continuity plan template for small businesses
Are you lacking a business continuity plan or aren’t sure where to start? Download our free sample business continuity plan template for small businesses.

Business continuity planning steps to keep your organization running
These 11 business continuity planning steps provide a comprehensive look at what you need to ensure continual operation during an incident.

Disaster recovery and business continuity plans require updating
It’s not necessary to update disaster recovery and business continuity plans all at once, but it is crucial to review them regularly.

How does business resilience differ from business continuity?
Business resilience has become a prominent element of disaster recovery, but the strategy can’t work without a business continuity plan.

Essential guide to business continuity and disaster recovery plans
Every year, our readers report a lack of confidence in their disaster recovery plan. If you are in that boat, this collection of our best BC/DR content can help.

Trending Terms
risk management
business impact analysis
disaster recovery plan
business continuity software
business continuity management
emergency management plan

Writing for Business
A business continuity plan ______ a number of activities that business continuity software systems can help facilitate and organize.
a. comprise
b. compose

November 6, 2017  8:56 PM

secondary storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Big Data

Secondary storage is used to protect inactive data written from a primary storage array to a nonvolatile tier of disk, flash or tape. Continued…

Quote of the Day

“A secondary storage system should restore data quickly and not be impacted by delivering other services at the same time.” – Chris Evans

Learning Center
Secondary data storage: A massively scalable transformation
Interactive, online secondary data storage is making more data directly available to end users and maximizing flash investments.

Navigate the secondary storage system market with these five factors
Data recovery and performance are among the secondary storage system areas you’ll need to analyze when selecting a provider in this new technology market.

A cure for secondary data storage services blues
Secondary data storage vendors need to evolve their products to provide granular data management within converged secondary storage.

Hyper-converged platforms grow to include secondary storage space
Storage vendors are leveraging existing technologies to build products to help hyper-converged systems tackle secondary storage.

Cohesity converged secondary storage adds automation
Cohesity software for converged secondary storage includes an automated policy engine for cloud archiving, data encryption and multisite replication.

Trending Terms
primary storage
nonvolatile storage
data migration
tiered storage
storage snapshot

Writing for Business
Servers equipped with flash storage are increasingly common and can _________ reduce latency.
a. farther
b. further

November 3, 2017  10:21 PM

cloud automation

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud Computing

Cloud automation is a broad term that refers to the processes and tools an organization uses to reduce the manual efforts associated with provisioning and managing cloud computing workloads.  Continued….

Quote of the Day

“There are two camps of tools for automation and orchestration in cloud: provider-native and third-party. To pick the right one, know your future needs, especially for multicloud.” – Alan R. Earls

Learning Center
Compare two types of cloud automation and orchestration tools
Cloud automation and orchestration get complicated, especially with multiple platforms in play. Assess whether native or third-party tools meet your needs.

Brush up your cloud automation and orchestration skills
Cloud automation and orchestration are critical technologies that save IT shops time and money. Use these five tips to implement them correctly.

Streamline cloud operations with Google automation tools
Google automation tools, like Resource Manager and Container Engine, facilitate VM restarts, updates and other tasks. Learn which tool is right for you.

Break down the difference between cloud automation and orchestration
Cloud automation and orchestration are different technologies that depend heavily on each other. Explore their key differences and how they work together.

How DevOps tools can be used to integrate cloud automation
DevOps tools can help with several aspects of cloud automation deployment. Here’s a look at the most commonly used tools.

Trending Terms
logical unit number
cloud orchestrator
IT automation
Infrastructure as Code

Writing for Business
In a hybrid cloud, sensitive data and computing resources may be maintained in two _________ environments.
a. separate
b. seperate

November 2, 2017  10:14 PM

PCI DSS compliance

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
PCI compliance

Payment Card Industry Data Security Standard (PCI DSS) compliance is adherence to the set of policies and procedures developed to protect credit, debit and cash card transactions and prevent the misuse of cardholders’ personal information. Continued…

Quote of the Day

“Overall responsibility for the PCI DSS compliance program may be assigned to individual roles and/or to business units within the organization, but the executive visibility is critical for service providers where protecting cardholder data is central to their business.” – Troy Leach

Learning Center
Enterprise compliance with PCI DSS is up, says Verizon
Compliance with PCI DSS is increasing, according to a Verizon report, but it’s not all good news. Plus, medical device firmware updates are out, and more.

PCI DSS 3.2 focuses on encryption and multifactor authentication
PCI DSS 3.2 includes requirements to strengthen encryption and multifactor authentication.

PCI DSS 3.2 marks the end of major updates to the standard
The PCI council said starting with PCI DSS 3.2, the standard won’t be seeing significant updates, but more incremental modifications.

Can video surveillance improve PCI DSS 3.0 compliance?
Expert Mike Chapple looks at PCI DSS 3.0 compliance and examines if video surveillance can improve physical security around point-of-sale systems.

How can vulnerability scanning tools help with PCI DSS compliance?
Vulnerability scanning tools are mandatory for full PCI compliance, but make sure your organization gets them from a PCI DSS Approved Scanning Vendor.

Trending Terms
PCI Security Standards Council
cardholder data
personally identifiable information
cardholder data environment

Writing for Business
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
a. continual
b. continuous

November 1, 2017  10:13 PM

spear phishing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Continued…

Quote of the Day

“Spear phishing is another core problem for corporations. Cybercriminals use targeted spear phishing of corporations’ emails as one of their most common attack vectors.” – Ben Cole

Learning Center
The art of the cyber warranty and guaranteeing protection
Jeremiah Grossman of SentinelOne talks with SearchSecurity about what it takes to develop a cyber warranty for threat detection products.

Whaling attacks: Taking phishing attacks to the next level
Whaling attacks are becoming more common. Enterprise threats expert Nick Lewis explains how to mitigate this targeted phishing attack.

Educate users to avert email phishing attacks
As email phishing attacks grow in complexity, they lure unsuspecting users to danger. Admins must communicate threats to improve IT security.

Email attacks that threaten networks and flood inboxes
It might not be as hard as you think to identify a phishing attack. Here are the signs of a phishing attack.

For CIOs, email data security should still be a top priority
In this Q&A, the former U.S. Customs and Border Protection CIO discusses why email data security remains a major threat to U.S. cybersecurity.

Trending Terms
Trojan horse
social engineering
email spoofing

Writing for Business
The phishing email warned that unless I updated my contact information, my eBay account would be _________.
a. canceled
b. cancelled

October 31, 2017  5:46 PM

ghost imaging

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Ghost imaging, often called cloning, is a software-driven data backup process that copies the contents of a computer hard disk in a single compressed file or set of files, referred to as an image. Continued…

Quote of the Day

“There are two general methods that work well in ghost image creation. One option is to use the Sysprep utility included with Windows. Another option is to use a third-party product such as Acronis True Image.” – Brien Posey

Learning Center
What are ghost imaging software benefits and drawbacks?
Ghost imaging software enables organizations to build a library of images and quickly bring up a new unit, but the technology has its downsides.

What are some ghost image creation issues?
Ghost image creation can be a quick and efficient method of data backup, but what qualifies as ghost imaging and how it is done may not be clear-cut.

Using imaging tools to restore domain controllers, avoid problems
Tools like Symantec Ghost can capture domain controller images. But rolling back to an AD state and restoring domain controllers is a complex process. Here’s how to avoid mishaps.

What is the difference between a storage snapshot and a clone?
Analyst Greg Schulz explains how a clone can be created from a storage snapshot, how each is implemented, and what types of environments they are best suited for.

Choosing the right data snapshot approach
Independent backup expert Brien Posey compares the various methods for creating a data snapshot in this Expert Answer.

Trending Terms
high-performance computing
disaster recovery
disk cloning

Writing for Business
The point of disaster recovery is the same for both large enterprises and _________ need to stay in business.
a. SMBs: They
b. SMBs; they

October 30, 2017  2:13 PM

skill-based routing (SBR)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Skill-based routing (SBR) is a component of automatic call distributor (ACD) systems that filters and directs incoming inquiries to call center agents with the most applicable skill sets. Continued…

Quote of the Day

“It is both more efficient and more effective to send billing inquiry calls to agents who have the best skills and training to provide accurate answers related to billing.” – Scott Sachs

Learning Center
Nine skills every call center agent job requires
From problem-solving to flexibility, here are the top nine skills call center agent job candidates should possess.

Call routing practices focused on customer journey
Demographic-based call routing can potentially give customers specific help based on their unique attributes and improve the customer journey in a contact center environment.

Five contact center automation tools you should know about
Self-service, skill-based routing and knowledge management software are just a few examples of contact center automation tools benefiting agents.

With Amazon Connect, AWS puts experience to work in contact center space
Amazon Connect hopes its cloud-based, pay per minute strategy earns a chunk of the nearly $10 billion contact center market.

Should you use demographics in contact center agent routing?
Contact center agents can become more effective on customer service calls if companies enlist demographic-based routing.

Trending Terms
automatic call distributor
call center
average handle time
contact center software
call center agent

Writing for Business
The question on everyone’s _____ is how to improve customer experience and cut costs at the same time.
a. minds
b. mind

October 27, 2017  5:35 PM

lead scoring

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

In the B2B industry, lead scoring is a ranking system used by sales and marketing departments to quantify the likelihood that a potential customer will make a purchase. Continued…

Quote of the Day

“Adding artificial intelligence to lead scoring can help companies increase sales by better prioritizing customers and aligning sales messaging and resources with clients.” – George Lawton

Learning Center
Where AI meets sales: The benefits of predictive lead scoring
Predictive lead scoring can help companies better prioritize customers, align messaging and determine ways to guide a sales strategy.

Predictive lead scoring among new Sales Cloud features
Predictive lead scoring in Salesforce Einstein will mine customers’ web history and interactions to continuously determine their engagement level.

AI integration with CRM tools boosts lead scoring processes
As AI technologies continue to build steam, AI integrations with CRM platforms are helping sales teams reap the benefits with predictive lead scoring.

Lead-scoring models to generate better sales information
Lead-scoring models help sales comb through data to generate better, more qualified and more mature leads.

If you need to close more deals, consider predictive lead scoring
With predictive lead scoring, companies can make sales cycles more productive and identify the most promising prospects, converting them into customers in less time.

Trending Terms
marketing automation
inbound marketing
clickthrough rate
sales cycle
demand gen

Writing for BusinessNeither the CEO nor the CIO _____ contributing to their company’s B2B blog.
a. is
b. are

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: