Word of the Day: Tech Definitions from WhatIs.com

November 3, 2016  8:08 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
DevOps, SDN

OpenConfig is a working group and network communication model that seeks to standardize network management interfaces and APIs across vendors. Continued…

Quote of the Day

“Software-defined networking has matured from a science experiment into deployable, enterprise-ready technology in the last several years, with vendors from Big Switch Networks and Pica8 to Hewlett Packard Enterprise and VMware offering services for different use cases.” – John Burke

Learning Center
Yahoo, Verizon execs: Prepare your networking team for SDN and DevOps
Verizon and Yahoo talked about the need for networking team members to look toward SDN and DevOps at ONUG’s fall 2016 conference.

How to assess the benefits of SDN in your network
The proposed benefits of SDN are becoming clearer, as are the questions you should ask about an SDN deployment to address your networking issues.

Could OpenConfig resolve automation struggles?
In this SDN blogs roundup, OpenConfig could make automation easier and why enterprises should keep it simple when solving network problems.

DevOps or SDN? You’ll need them both to work together
When it comes to DevOps or SDN, do you really need to choose one over the other? Most IT shops will need both. SDN will be the ultimate DevOps tool set, while DevOps will make IT pros SDN-ready.

Where SDN and DevOps tools meet
Combining SDN and DevOps tools will mean the network can play a key role in IT orchestration and an application-aware, responsive infrastructure.

Related Terms
application program interface

Related Tags
SDN research
Network automation and orchestration

November 2, 2016  8:18 PM

human capital management (HCM)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Human capital management (HCM) is an approach to employee staffing that perceives people as assets (human capital) whose current value can be measured and whose future value can be enhanced through investment. Continued…

Quote of the Day

“The HCM system journey doesn’t stop at go-live, so thinking about how the system will be managed in the immediate and long-term periods after the go-live should be in the project plans from the start.” – Luke Marson

Learning Center
Vendors showcase five new HCM technologies
Executives from SAP, Halogen Software, ADP and two other vendors took the stage to describe new HCM technologies developed during the past year.

Seven keys to a successful global HCM implementation
A proactive and strategic approach to your HCM implementation helps ensure success. Here’s advice on managing a global human capital management rollout.

Tokyo firm enters human capital management software race in U.S.
A Japanese vendor prepares to enter the U.S. with human capital management software, while ADP and Workday offer improved payroll integration.

Your guide to successful HR and HCM software implementation
Successful HR and HCM software implementations require a holistic strategy. Our essential guide leads you through one, from research to user adoption.

Steps to take before implementing a cloud-based HCM system
The efficiencies of a cloud-based HCM system can provide a wealth of value, but before you make the move, you need to evaluate your current HR infrastructure.

Related Terms
TM software
employee assessment software
continuous performance management

Related Tags
Human resource management systems
Talent management and recruiting software

November 1, 2016  9:04 PM

born digital

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Born digital, in reference to people, is a description of individuals who have grown up with the current state of ubiquitous computing and communications, typified by technology like smartphones, social media and near-continuous Wi-Fi networks. Continued…

Quote of the Day

“Millennials’ technology expectations have been shaped by smartphones, Facebook and digital media — in other words, by easy and ubiquitous connectivity.” – Beth Stackpole

Learning Center
Liquor distributor turns to SD-WAN to support digital operation
Liquor distributor Republic National Distributing Co. finds Silver Peak SD-WAN less expensive than Cisco and Citrix for supporting its digital operation.

How Millennials’ technology expectations can help save manufacturing
Millennials’ technology expectations will need to be met if manufacturing is to court this talent source to fill its skills gap. Here’s what to know.

People are biggest hurdle in workplace transformation
Citrix’s Michael McKiernan offers advice on how CIOs can help employees get used to a workplace transformation in this SearchCIO video interview.

Want to sell cloud computing? Focus on Millennials
Cloud computing has reached a mature state in the small and medium-sized business sector, where Millennials have emerged as top buyers.

Millennials and technology are reshaping IT departments
Millennials are forcing organizations to reconsider their attitudes towards smartphones, tablets and the cloud. To younger workers, this technology is simply a part of life.

Related Terms

Related Tags
Enterprise content management workflow
Business process management

October 27, 2016  9:10 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
ai, engine

In computer programming, an engine is a program that performs a core or essential function for other programs. Engines are used in operating systems, subsystems or application programs to coordinate the overall operation of other programs.  Continued…

Quote of the Day

“Business rules engines are usually architected as pluggable software components that separate the business rules from the application code. This separation helps reduce the time, effort, and costs of application maintenance.” – Alex Berson

Learning Center
Overview of Business Rules Engines
Learn how to successfully navigate the business rules engines.

A search engine that ‘makes’ data-driven business decisions
Search engine technologies can mine enterprise data for making data-driven business decisions. Sid Probstein of Attivio discusses the company’s graph engine and how it works.

Powering a more efficient enterprise search engine
To power an enterprise search engine that locates relevant, valuable results, companies are turning to new technologies like analytics and search-based apps.

Spark vs. Hadoop: Is big data engine a replacement part?
Strata + Hadoop World 2015 attendees offer a range of views on Spark vs. Hadoop, looking at whether Apache Spark may replace its vaunted predecessor.

Cisco analytics engine helps maintain app health in big data centers
The latest Cisco analytics engine examines 1 million traffic flows a second to help network administrators maintain application performance.

Related Terms
deep learning
Analytical Engine
correlation engine
Charles Babbage

Related Tags
Database management products and solutions
Enterprise search platforms

October 26, 2016  8:13 PM

quantum computing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Quantum computing is an area of study that focuses on developing computer technology that is based on the principles of quantum theory. Following the laws of quantum physics, a computer would gain enormous processing power through the ability to be in multiple states and to perform tasks using all possible permutations simultaneously. Continued…

Quote of the Day

“Besides transforming material science, quantum computing could lead to significant developments in artificial intelligence and allow for search or analysis of much more data than can be handled by today’s most powerful machines.” – David Cory

Learning Center
Can IBM fast-track quantum computing via the crowd?
IBM hails its new cloud-enabled quantum computing service as the birth of the quantum age of computing. Also in Searchlight: Facebook rewards 10-year-old for ethical hacking.

IBM takes on quantum computing; how CIOs can hone customer-centric design
IBM is seeking to speed innovation and discover new use cases for quantum computing.

Google snaps up startup in push to master computer vision
With its purchase of Moodstocks, a machine learning-based image recognition startup, Google keeps pushing into the next frontier — computer vision. Also: C-level exit at Microsoft.

Three CIO communication tips that will change the way you lead
Mark Jeffries argues that knowing these three communication assumptions will turn CIOs and senior IT leaders into better communicators.

Emerging tech trends point to new era of digital business
This year’s hype cycle on emerging tech trends whittles down 2,000 technologies to the 30-plus CIOs should consider when building out their IT roadmap.

Related Terms
quantum theory
quantum computer
uncertainty principle

Related Tags
Leadership and strategic planning
Cloud computing for enterprise CIOs

October 25, 2016  6:48 PM

Hofstadter’s law

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Project management, Time Management

Hofstadter’s law is the observation that “It always takes longer than you expect, even when you take into account Hofstadter’s Law.” In other words, time estimates for how long anything will take to accomplish always fall short of the actual time required — even when the time allotment is increased to compensate for the human tendency to underestimate it. Continued…

Quote of the Day

“Once you realize that time is your most important asset, it becomes clear that you have to be stingy about what you take on.” – Kevin Beaver

Learning Center
Time management strategies for the IT pro
To get the most out of your IT career, time management skills are critical for IT professionals to have. Hone your talents with these time-management best practices and get the most out of every working minute.

Can time management improve productivity of QA testers?
QA time management is not a contradiction in terms. Expert Amy Reichert shares her secrets with QA testers to end testing procrastination forever.

How to estimate project completion times
To determine the duration of an individual task or calculate when a project will complete, Lawrence Oliva suggests using your expert judgment, top-down estimating, and parametric formulas such as PERT.

Top 10 time management tips
Do you have a time management problem? Use these ten tips to see if you do and solve the problem.

Prioritize your IT tasks and finally conquer your to-do list
It’s easy to feel overwhelmed by a growing to-do list of IT tasks, but there are easy steps you can take to decide what to tackle first and what can wait.

Related Terms
time management
project management
pomodoro technique
relentless incrementalism

Related Tags
Software project management process
IT career development and training

October 24, 2016  8:04 PM

access governance

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Access control

Access governance (AG) is an aspect of information technology (IT) security management that seeks to reduce the risks associated with end users who have unnecessary access privileges. Continued…

Quote of the Day

“All types of organizations are discovering that they need much greater visibility into who can access their key resources — and maintain stronger policies and controls over employees who no longer need to access task-specific information.” – Travis Greene

Learning Center
How IAM can address unstructured content security risks
Unstructured content is difficult to locate and manage. Learn how your enterprise can apply identity and access management and improve security controls.

User provisioning best practices: Access recertification
User provisioning best practices dictate that user access needs to be continually monitored to make sure no one has access to anything they shouldn’t — known as access recertification. Learn more about how to implement this process in this expert tip.

Companies falling behind on IT access governance, survey finds
IT access governance is becoming a major problem, according to a new Ponemon Institute survey. Many enterprises are having trouble keeping pace with access changes as the result of cloud computing, outsourcing and a greater reliance on independent contractors.

Best practices: How to implement and maintain enterprise user roles
Checklist: Learn the steps necessary for a successful enterprise user role management implementation.

Access control compliance and corporate governance considerations
Learn about access control compliance considerations and how to help your client stay compliant when implementing access control technologies.

Related Terms
access control
risk management
access recertification

Related Tags
Web authentication and access control
Enterprise user provisioning tools

October 21, 2016  5:33 PM

data center infrastructure management (DCIM)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data center infrastructure

Data center infrastructure management (DCIM) is the convergence of IT and building facilities functions within an organization. The goal of a DCIM initiative is to provide administrators with a holistic view of a data center’s performance so that energy, equipment and floor space are used as efficiently as possible. Continued…

Quote of the Day

“With DCIM, many corporations have been through the early deployment stage, understand the potential pain points, and realize that successfully deploying DCIM solutions is a lot of work.” – Jennifer Cooke

Learning Center
Evolving DCIM market shows automation, convergence top IT’s wish list
The DCIM market evolves as IT teams look for new capabilities in data center management tools, ranging from greater automation to predictive analytics.

Users, experts speak out about DCIM tools
Users and experts explore their thoughts on the usefulness and future of DCIM tools.

Next-gen DCIM software holds insights for data center groups
DCIM software unifies facilities and IT with comprehensive data center monitoring. Next-gen tools even tell the business about available capacity and green IT.

Early DCIM software users pay more than Johnny-come-latelies
The TCO for DCIM software has dropped by 40% in three years as enterprises find ways to bring IT and facilities teams together in the data center.

DCIM vendors’ promises vs. data center realities
DCIM vendors and products are volatile today, giving some enterprise IT shops pause about whether DCIM’s promised future benefits are worth today’s cost and integration hassles.

Related Terms
data center infrastructure efficiency
power usage effectiveness
water usage effectiveness
building management system
continuous modeling

Related Tags
Converged systems management
Data center capacity planning

October 21, 2016  3:31 PM

sock puppet marketing

Margaret Rouse Margaret Rouse Profile: Margaret Rouse

Sock puppet marketing is the use of a false identity to artificially stimulate demand for a product, brand or service. Continued…

Quote of the Day

“It sounds harmless, but don’t be fooled. Sock puppetry on social media outlets is not only unscrupulous, but it may be illegal in some cases.” – Laura Aberle

Learning Center
Using social media so your brand awareness strategy strikes it hot
Visibility, relevance and velocity are three key areas to measure in using social media for your brand awareness strategy.

Using social media for business: Terms you should know
Social media offers new ways for enterprises to collaborate with consumers. Here’s a roundup of terms related to using social media for business, from the basics to newer concepts.

Internal social CRM strategies, personality seen as building brand awareness
Social CRM is still about business strategy and customer satisfaction, but the social part brings a whole new element to traditional CRM. Find out how Dell and three other companies leverage social CRM to build brand awareness with social media tools.

Choosing the right social media branding strategy
Social media branding strategy can help businesses generate publicity and build consumer loyalty, but there’s no one-size-fits-all approach for this component of modern marketing.

Customer engagement strategies hinge on social media savvy
Social media is gaining importance in customer engagement strategies, but many sales teams struggle with how to take full advantage of social tools.

Related Terms
sock puppet
reputation management
social media influence
Internet shill

Related Tags
Enterprise social media management
Internet marketing strategy

October 19, 2016  8:06 PM

digital transformation

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Digital transformation

Digital transformation is the reinvention of an organization through the use of digital technology to improve the way it performs and serves its constituents. Digital refers to the use of technology that generates, stores and processes data. Continued…

Quote of the Day

“Because digital transformation won’t look the same from one business to the next, starting small gives CIOs the opportunity to experiment so you can capitalize on those that take off and kill those that don’t.” – Gerald C. Kane

Learning Center
Digital transformation to be major theme in ONUG 2016 fall conference
ONUG co-founder Nick Lippis discusses major topics that will be covered during the ONUG 2016 fall conference. Hint: Digital transformation.

Digital transformation initiatives reap business value
Digital transformation initiatives can help organizations streamline their communications and improve employee workflows.

2016 channel trends: Digital transformation to alter relationships
Channel trends in 2016 will include digital transformation, cloud management, IT security and the Internet of Things.

How ‘digital empowerment’ of users can speed business transformation
In this video interview, Allison Mnookin, CEO at QuickBase Inc., explains the value of digital empowerment.

Without an ITSM strategy, there is no digital transformation
Top-notch ITSM practices, far from being a roadblock to digital transformation, are the CIO’s key to delivering radical business change.

Related Terms
IT transformation
digital enterprise
business model innovation

Related Tags
Leadership and strategic planning
Enterprise IT and business management

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: