Word of the Day: Tech Definitions from WhatIs.com

October 26, 2017  5:41 PM

Amazon Simple Queue Service (Amazon SQS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Amazon, AWS

Amazon Simple Queue Service (Amazon SQS) is a pay-per-use web service for storing messages in transit between computers. Continued…

Quote of the Day

“SQS can also provide first-in, first-out queues, which allow developers to guarantee that messages process in the exact order they are sent — and process exactly one time.” – Chris Moyer

Learning Center
Work Lambda into Amazon SQS queues to prevent backlogs
Optimize Amazon SQS queues with FIFO processing, Lambda and CloudWatch to boost developer appeal and meet microservices demands.

Find an AWS messaging service to fit your needs
AWS messaging services meet different enterprise needs. Choose carefully between Amazon SQS and SNS to ensure you’re using the right system for the job.

When and how to use a FIFO queue in SQS
Using a FIFO queue in Amazon SQS processes items in an orderly way. But use it with the wrong workload and scalability issues will create disorder.

Using Amazon SQS for scalable applications
Amazon SQS, or Simple Queue Service, is a managed, on-demand message queuing tool. It has a few benefits over other queuing systems such as Apache ActiveMQ, Rabbitmq and Redis.

SQS queue workarounds for AWS Lambda functions
AWS Lambda was not designed to integrate with messages from an SQS queue. But Developers figured out several alternatives, such as polling the queue, to achieve a similar result.

Trending Terms
message queueing
Amazon SimpleDB
fault tolerant
Amazon RDS
Amazon EC2

Writing for Business
We use Amazon S3 to ________ local storage.
a. complement
b. supplement

October 25, 2017  6:57 PM

clinical trial

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
health IT tools

A clinical trial, also known as a clinical research study, is a protocol for evaluating the effects of experimental medical or behavioral interventions on health outcomes. Continued…

Quote of the Day

“Pharmacovigilance software analytics systems have become increasingly important in light of tighter regulation of the life sciences industry — and incidents such as a recent French clinical trial in which a person died and five were hospitalized.” – Shaun Sutner

Learning Center
Remote patient monitoring changes clinical trials
Clinical research organizations running drug trials can cut their budgets and collect more data by deploying remote patient monitoring technology.

Clinical trials, collaboration drive life sciences opportunities
The life sciences market is growing, with clinical trials information management being a key driver. But the market contains some cultural challenges for solution providers.

Pharmacovigilance software helps detect lethal drug trial errors
Using pharmacovigilance software systems, pharma companies and healthcare providers can better prevent lethal medication-related errors, expert says.

Ongoing clinical studies show new value for patient social networks
Will proactive participants in patient social networks lead clinical trials? See how two studies point pave the way for future possibilities.

EHR adoption may not support clinical studies as proponents hope
Proponents of EHR adoption often talk about how the technology will support clinical trials by making it easier to recruit patients and get them signed up for appropriate studies.

Trending Terms
data anonymization
personally identifiable information
clinical documentation
clinical decision support system
remote patient monitoring

Writing for Business
The FDA reclassified sutures as Class II medical devices in the early ______.
a. 1990’s
b. 1990s

October 24, 2017  6:50 PM

Hyper-V Manager

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Microsoft Hyper-V Manager is an administrative tool to create, change and delete virtual machines (VMs). An administrator can manage a local Hyper-V host and a limited number of remote hosts from a single Hyper-V Manager tool. Continued…

Quote of the Day

“Microsoft has made significant improvements to the Hyper-V Manager, even though these improvements exist mostly behind the scenes.” – Brien Posey

Learning Center
Create Hyper-V VMs with PowerShell, SCVMM or Hyper-V Manager
You can use Hyper-V Manager, SCVMM or PowerShell to create Hyper-V VMs, but there are important considerations for using one method over another.

Check the system hardware for Hyper-V requirements
Use the Systeminfo.exe and Coreinfo.exe tools to see if your hardware components meet the Hyper-V requirements for the product and its features.

Use a performance counter to detect Hyper-V bottlenecks
Find the root cause of Hyper-V bottlenecks by using the specific performance counter for each resource: network, storage, CPU and memory.

Hyper-V 2016 features support shared storage alternatives
Hyper-V 2016 provides organizations with many storage options, including file-based and block-based storage, to achieve workload availability.

Top 10 Microsoft Hyper-V tools to consider
The HV remote tool boils down remote management for Microsoft Hyper-V into just a few commands. It can’t get much simpler than that and that makes it part of our top Hyper-V tool list.

Trending Terms
virtual machine
Microsoft Hyper-V 3.0
Microsoft Windows Server 2016
Microsoft Client Hyper-V
parent partition

Quiz Yourself
This type of partition is the first one created and starts the hypervisor.
a. What is a root partition?
b. What is a parent partition?

October 23, 2017  4:51 PM

passive reconnaissance

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Passive reconnaissance is an attempt to gain information about targeted computers and networks without actively engaging with the system. Continued…

Quote of the Day

“The more information a security administrator has about a cloud platform, the better the organization can protect and monitor it. There are many ways to gather this information, both passively, through cloud reconnaissance, and actively, through cloud enumeration.” – Frank Siemons

Learning Center
Why cloud reconnaissance is crucial to a secure cloud environment
Cloud reconnaissance and enumeration are important aspects of securing an enterprise cloud environment. Here’s a look at why, and how to accomplish it.

Understanding footprinting as a predecessor to cyberattacks
Footprinting is an early step in cyberattacks, so enterprises should have a solid understanding of what exactly it is. Expert Ernie Hayden explains the process.

How to use threat intelligence metrics to attain relevant data
Determining the right threat intelligence metrics for your organization is a crucial step for improving security. Here’s how to get threat metrics right.

What are the best anti-network reconnaissance tools for Linux systems?
Network reconnaissance attackers on Linux and Ubuntu can be prevented with several different tools and methods. Find out the best ones for the job.

Network lateral movement from an attacker’s perspective
The network lateral movement process from an attacker’s point of view and a security researcher details what security professionals should watch out for.

Trending Terms
active reconnaissance
war driving
ethical hacker
passive attack
intrusion prevention
vulnerability analysis

Quiz Yourself
These are also known as ethical hackers and strive to operate in the public’s best interest, rather than to create turmoil.
a. What are black hat hackers?
b. What are white hat hackers?

October 20, 2017  4:46 PM

cloud storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud computing, SaaS

Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network (typically the Internet). Continued…

Quote of the Day

“Public cloud storage providers help organizations offload their physical hardware and associated costs, including power, cooling and server maintenance.” – Matthew Pascucci

Learning Center
IT reveals keys to Box user adoption
IT departments adopting Box share their secrets to getting user and business buy-in. Pushing the productivity benefits is crucial to see widespread Box user adoption.

Public cloud storage market advances around big data, SSDs
The public cloud storage market has come a long way, with major improvements to both cost and performance. Here’s what the future might have in store.

Choose and manage a public cloud storage service successfully
Choosing a public cloud storage service can be a confusing process. Review the market options, and implement these storage management and optimization tips.

Take the sting out of switching cloud data storage providers
Before you decide to switch cloud data storage providers and start the data migration process, qualify providers and choose a migration approach.

Optimize a hybrid cloud platform with storage as a service
Inefficient data management causes a hybrid cloud platform to experience latency and performance issues. A SaaS system can help things run more smoothly.

Trending Terms
cloud backup
cloud storage providers
public cloud
private cloud
hybrid cloud
Storage as a Service

Quiz Yourself
In this type of hybrid cloud deployment, an organization only pays for extra compute resources when they are needed.
a. What is cloud bursting?
b. What is cloud insurance?

October 19, 2017  6:02 PM

going dark

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Going dark is military lingo for the sudden termination of communication. Continued…

Quote of the Day

“In an attempt to rebrand the debate around ‘going dark,’ Deputy Attorney General Rod Rosenstein urged tech companies to deploy what he called ‘responsible encryption.'” – Peter Loshin

Learning Center
‘Going dark’: Weighing the public safety costs of end-to-end encryption
Encryption has become a prevalent tool for protecting data. But according to the intelligence community, it’s also become key for terrorists and criminals to ‘go dark.’

DOJ’s ‘responsible encryption’ is the new ‘going dark’
‘Responsible encryption’ will replace ‘going dark’ for DOJ. Plus, more banking breaches and vulnerabilities, and Accenture data was exposed in AWS S3 buckets.

Congress considers ‘going dark’ encryption legislation
Roundup: Congress weighs ‘going dark’ options for encryption legislation, as Sens. Dianne Feinstein and Richard Burr solicit comments on their draft bill.

Going dark: FBI continues effort to bypass encryption
The FBI’s effort to bypass encryption has led security experts and tech companies, such as Apple, to fight back in the ‘going-dark’ debate.

Risk & Repeat: Strong encryption under fire again
This Risk & Repeat podcast examines new government criticism of strong encryption and what it means for the encryption debate.

Trending Terms
National Security Agency
strong cryptography
end-to-end encryption
deep Web

Quiz Yourself
The origin of this is usually dated from about 2000 BC, with the Egyptian practice of hieroglyphics.
a. What is cryptography?
b. What is a pyramid brokerage?

October 18, 2017  7:54 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Sugging, also spelled SUGGing, is an acronym that stands for “selling under the guise” of research. Continued…

Quote of the Day

“The practice of sugging also undermines the value of true research which is an essential tool for the development of evidence-based policy and decision making.” – Jane Frost

Learning Center
Conducting technology market research for new techs, products
Find out how channel partners approach technology market research when considering adding a new technology or product as a business offering.

IT channel sales and marketing strategy for the digital era
Having an effective sales and marketing strategy is essential for every IT channel company in today’s world. Here are the ins-and-outs to get you started.

IT and marketing: working together for business success
The IT department builds things that scale and last, while marketing wants the next big thing – and needed it yesterday. How can heads of technology work effectively with marketing? Cliff Saran investigates.

Computer Market Research unveils marketing funds tool for partners
Computer Market Research introduces a tool for managing vendor-provided marketing funds; Ingram Micro expands its ProAV/Digital Signage portfolio; and more channel news.

Smartphones sound the death knell for outbound marketing strategies
The smartphone-saturated consumer market is slowly deflating outbound marketing strategies and telemarketing.

Trending Terms
market research
survey research
data privacy
data sampling
direct marketing
do not call list

Quiz Yourself
This is a performance-based marketing strategy in which one company pays another for referred business.
a. What is recruitment marketing?
b. What is affiliate marketing?

October 17, 2017  4:19 PM

hybrid WAN

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A hybrid WAN is a wide area network that sends traffic over two or more connection types. Continued…

Quote of the Day

“Many large organizations are moving away from exclusive hybrid WAN vs. SD-WAN choices and are deploying SD-WAN as part of their hybrid WAN options.” – Lee Doyle

Learning Center
Is it hybrid WAN vs. SD-WAN, or does SD-WAN help implement hybrid WAN?
It’s not a matter of hybrid WAN vs. SD-WAN. The two technologies can be used together to make deployment and operation easier.

SD-WAN-only devices disappearing as market matures
SD-WAN vendors are responding to customer demand with multifunction networking appliances. As a result, SD-WAN is vanishing as a stand-alone product in the branch office.

Is a hybrid WAN architecture right for you?
Hybrid WANs are growing in popularity. But what are the questions you should ask before deploying a hybrid WAN architecture?

What do I need to do to create successful hybrid WANs?
As the market for hybrid network services booms, the challenge of creating successful hybrid WANs grows.

SD-WAN makes secure networks possible in hybrid WANs
Software-defined WAN (SD-WAN) is helping enterprises maintain secure networks while embracing hybrid WAN architectures at the branch.

Trending Terms
Secure Sockets Layer
leased line
security token

virtual private LAN service

Quiz Yourself
This authentication credential uses biometric data.
a. What is a possession factor?
b. What is an inherence factor?

October 16, 2017  7:36 PM

communication plan

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A communication plan is a policy-driven approach to providing stakeholders with information. Continued…

Quote of the Day

“Every organization should implement a formal communication strategy in order to avoid ERP implementation “divorce court.” – Bill Baumann

Learning Center
Assemble your toolbox for distributed decision-making
A distributed decision-making model requires excellent communication so stakeholders can make the best decisions possible at any given time.

Do you need an emergency communication plan for business?
An emergency communication plan for business can save lives. Without planning, there are major risks to employees and an organization.

Why communication is critical to implementing ERP
Implementing ERP is a difficult endeavor, at best. That’s why your strategy needs to include a detailed communication plan.

The essential guide to ERP for small and medium-sized businesses
ERP can be an essential growth driver for small and medium-sized businesses. Here’s a guide to what it is, why you need it and how to buy it.

Business continuity planning steps to keep your organization running
These 11 business continuity planning steps provide a comprehensive look at what you need to ensure continual operation during an incident.

Trending Terms
vision statement
project planning
emergency communications plan
change management
strategic planning

Quiz Yourself
Organizational change management (OCM) addresses the people side of change management.
a. true
b. false

October 13, 2017  6:56 PM

digital disruption

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
consumerisation, Digital economy

Digital disruption is the change that occurs when new digital technologies and business models affect the value proposition of existing goods and services. Continued…

Quote of the Day

“To thrive in today’s digital marketplace, companies need to push past doing one-off digital projects and metamorphose into ‘digital businesses’ — meaning they must use digital technologies to change not just processes but how value is created for customers.” – Marc Benioff

Learning Center
Digital disruption shapes big data infrastructure, data engineering
Big data infrastructure plans and data engineering processes are undergoing changes, both for digital disruptors and those they would disrupt.

Customer-focused strategy more key than digital transformation hype
Companies should ignore tech vendors’ talk of digital transformation and disruption and make purchases based on a fine-tuned customer-focused strategy.

Quiz: Are you ready for digital technology disruption?
Digital technology disruption is transforming entire industries. Take this quiz and see if your company is a leader or a laggard.

Digital business disruption roils the manufacturing sector
Annals of digital business disruption: David Foote follows the money and finds that hard-core manufacturers are coming to terms with the digital era.

Top 5 markets disrupted by sharing economy apps
Sharing economy apps can thrive and disrupt incumbent industries. Explore the five top markets that could become the next frontier of digital disruption.

Trending Terms
value proposition
IT consumerization
disruptive technology
disruptive innovation
digital economy
fourth industrial revolution

Quiz Yourself
Also called continuous improvement, this is best known for being used in lean manufacturing and lean programming.
a. What is kanban?
b. What is kaizen?

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: