Word of the Day: Tech Definitions from WhatIs.com

September 27, 2016  9:31 PM

Hadoop cluster

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Big Data analytics, Hadoop

A Hadoop cluster is a special type of computational cluster designed specifically for storing and analyzing huge amounts of unstructured data in a distributed computing environment. Continued…

Quote of the Day

“A Hadoop cluster based on commodity hardware is better positioned to scale incrementally, and the required investment in a few more compute nodes and storage devices should be relatively small.” – David Loshin

Learning Center
Get your analytics architecture right to support scalable tools
Analytics teams can’t overlook the importance of setting up a scalable analytics architecture before deploying data tools and models to lines of business.

New tools offer a better view into managing Hadoop clusters
When Hadoop clusters move from pilots to production, big data management tools from LinkedIn, BlueData and Hortonworks may help ease the transition.

Make the right choice between Hadoop clusters and a data warehouse
A comparison of specific criteria and variables can help organizations decide whether their data processing needs are best met by Hadoop clusters or an enterprise data warehouse.

Managing Hadoop projects: What you need to know to succeed
Many companies are implementing Hadoop projects to manage pools of big data. This guide offers different perspectives on the Hadoop framework, explaining what Hadoop can and can’t do.

How big data and Hadoop will change storage management
Big data analytics creates some challenges for storage managers, but effective integration of big data and Hadoop into a storage environment can make them less daunting.

Related Terms
application clustering
unstructured data
distributed computing
parallel processing software

Related Tags
Big data analytics
Hadoop framework

September 27, 2016  4:32 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud computing, Sharding

Sharding is a type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards. The word shard means a small part of a whole. Continued…

Quote of the Day

“Database sharding isn’t anything like clustering database servers, virtualizing datastores or partitioning tables. It goes far beyond all of that.” – Jason Tee

Learning Center
Shards of Oracle: Distributed performance improved in Oracle 12c Release 2
Oracle sharding takes a page from playbooks of Amazon and others. With Oracle 12c Release 2, it joins Real Application Clusters in the company’s toolkit.

RAID systems yield to erasure coding for data protection
RAID systems have been the pre-eminent data protection choice for decades, but data growth and high-capacity systems have led to a rise in popularity of erasure coding.

Sharding in the Cloud
I/O reads to non-virtualized datastores can be one of the biggest bottlenecks in applications that have been deployed to the cloud. One of the easiest ways to avoid this problem is to simply shard your database.

Like Americanos? Then you’ll love distributed storage
Read replication, sharding and consistent hashing made simple. The Data Mill reports.

Sharding relational databases in the cloud
Discover why best practices in relational database sharding for Big Data in cloud computing databases are an essential part of the data management process.

Related Terms
relational database management system
distributed file system

Related Tags
Cloud management and monitoring
DBMS software and technology

September 26, 2016  4:26 PM

social media analytics

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Analytics, social media

Social media analytics is the practice of gathering data from blogs and social media websites and analyzing that data to make business decisions. The most common use of social media analytics is to mine customer sentiment in order to support marketing and customer service activities. Continued…

Quote of the Day

“Social media analytics also differs from traditional analytics in its complete reliance on online data as its data source.” – Reda Chouffani

Learning Center
How social media and analytics have redefined politics
Social media and analytics have had a major effect on electoral politics, as well as enterprise operations.

Tapping the potential of social media analytics tools
Social media analytics tools can help companies find and make sense of valuable customer data. This guide examines the potential and the challenges that come with social media analytics.

Social media monitoring tools rarely used to full potential
Social media monitoring tools give companies the data they need to build targeted marketing strategies, if they successfully analyze social data.

Social media monitoring tools: What they can and can’t do
Social media analytics has the potential to give companies valuable insight into customer data in new ways. Test your understanding of social media monitoring tools by taking this quiz.

Five key questions about social media monitoring and analytics
For enterprises looking to derive business value from social media monitoring and analytics, our expert has answers.

Related Terms
business analytics
social media monitoring
social CRM
opinion mining
unstructured text

Related Tags
Customer analytics
Enterprise social media management

September 22, 2016  7:15 PM

noisy neighbor

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud computing

Noisy neighbor is a phrase used to describe a cloud computing infrastructure co-tenant that monopolizes bandwidth, disk I/O, CPU and other resources, and can negatively affect other users’ cloud performance. The noisy neighbor effect causes other virtual machines and applications that share the infrastructure to suffer from uneven cloud network performance. Continued…

Quote of the Day

“In general, noisy neighbor is a potential issue with any public cloud service provider, so customers of all sizes need to understand their options for detecting and mitigating problems with cloud bandwidth.” – Dan Sullivan

Learning Center
Navigate noisy neighbor challenges in cloud vs. colocation
When it comes to cloud versus colocation, the multi-tenant challenges can differ. Find the right provider that won’t let noisy neighbors come knocking.

How to restore cloud bandwidth within shared resources
Shared resources on a server can result in a problem called ‘noisy neighbor,’ in which cloud bandwidth is limited. AWS users can avoid the issue.

AWS fends off ‘bouncy’ cloud computing performance perception
Amazon Web Services officials last week looked to dispel the notion that variations in cloud computing performance on EC2 are due to ‘noisy neighbors’ on shared hardware.

Hypervisors complicate storage I/O with blender effect
In this video, expert Howard Marks describes what he calls the I/O blender and noisy neighbor effects of hypervisors and explains why they can be detrimental to storage I/O.

Cloud storage providers moving to all-flash platform
Find out why cloud storage providers are shifting toward an all-flash platform and how to reduce costs by bursting workloads into an all-flash cloud.

Related Terms
bare metal environment
cloud load balancing
distributed apps

Related Tags
Network and application performance in the cloud
Colocation hosting and outsourcing management

September 22, 2016  5:17 PM

application performance monitoring (APM)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Application performance

Application performance monitoring (APM) is an area of information technology (IT) that focuses on making sure software application programs perform as expected. The goal of performance monitoring is to provide end users with a quality end-user experience. Continued…

Quote of the Day

“With APM tools available to us, it is now possible to redefine what “broke” means and switch from the reactive break-fix mode to being proactive, timely, intervention mode.” – Kevin Parker

Learning Center

What to expect from application performance monitoring tools
Without application performance monitoring tools, IT teams waste valuable time firefighting, and business users and customers will struggle with unresponsive apps at vital times.

Integrating application performance and ALM tools
In today’s application lifecycle management (ALM), uptime and availability are no longer the focus, according to ALM expert Kevin Parker. In this response, he explains how we have the option to integrate application performance monitoring (APM) tools with the capabilities of ALM tools, and how we should do this.

Application performance management tutorial: Pulling it all together
Learn how to use systems management tools for application performance management. This guide includes the latest trends, case studies and advice from SearchDataCenter.com.

What you need to know about application performance monitoring tools
Using application performance monitoring tools is an objective for many IT network managers who want to keep users satisfied with their apps and give them a positive experience.

Seven must-have cloud computing tools for admins
Cloud application monitoring tools are the key to a positive end-user experience. Be proactive and stop issues before they even start.

Related Terms
application monitoring and management
IT performance management
application awareness
network management system
cloud application performance management

Related Tags
Enterprise business continuity management
Patches, alerts and critical updates

September 21, 2016  2:42 PM

Remote Desktop Session Host (RDSH)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
RDS, Remote desktop, Virtualization

Remote Desktop Session Host (RDSH) is a role in Remote Desktop Services (RDS), which was known as or Terminal Services prior to Windows Server 2008 R2. RDSH servers host Windows applications or desktops that are accessed by remote users over a network connection. Continued…

Quote of the Day

“In the case of RDSH, its biggest advantage is that it has existed for a long time and really hasn’t changed that much over the years. RDSH is stable, reliable and very well documented and supported.” – Brien Posey

Learning Center
Microsoft Remote Desktop Services vs. Remote Desktop Session Host
Learn about Microsoft Remote Desktop Services and Remote Session Host, the company’s two approaches for delivering virtual desktops and applications.

VDI vs. RDSH doesn’t matter if users don’t need full Windows desktops
Microsoft’s Remote Desktop Session Host can help you deliver applications and desktop sessions to users. Most employees don’t need full Windows desktops, so why count RDSH out?

Complete guide to RDS management and RDSH
Remote desktop services (RDS) and Remote Desktop Session Host (RDSH) are alternatives to full-fledged VDI. Find out about RDS management, issues with the technology and more.

Navigate the complexities of remote desktop printer redirection
Remote desktop printer redirection is often riddled with issues, whether users are printing through the network or locally. Printer drivers can also cause hiccups.

Compare top tools for deploying virtualized applications
Finding the right platform to deploy and manage virtualized applications is a challenge. Explore offerings from Citrix, VMware and Microsoft.

Related Terms
remote desktop connection broker
Microsoft Azure RemoteApp
remote access

Related Tags
Terminal services and remote desktop services
Virtual desktop infrastructure and architecture

September 20, 2016  3:01 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Unified Communications, WebRTC

WebRTC (Web Real-Time Communications) is an open source project that seeks to embed real-time voice, text and video communications capabilities in Web browsers. Continued…

Quote of the Day

“WebRTC doesn’t really mean you no longer need servers to negotiate and connect a call. It just means, in many cases, you’ll be able to communicate directly between browsers.” – Tsahi Levent-Levi

Learning Center
How has the WebRTC codec clash affected adoption?
WebRTC expert Tsahi Levent-Levi examines the effect of the WebRTC codec clash on vendor and business adoption of the technology.

What WebRTC applications will and won’t do for enterprises
UC analysts and vendors discuss what emerging WebRTC applications will offer enterprises, as well as misconceptions around the pre-standardized protocol for ubiquitous voice and video conferencing.

What is a WebRTC server and how does it connect calls?
A WebRTC server is actually a collection of back-end servers, including signaling and media servers, which negotiate Web-based calls.

What are best practices for managing WebRTC services?
WebRTC expert Tsahi Levent-Levi discusses best practices to manage WebRTC services, like WebRTC voice and video, to maintain a consistent user experience.

Understand WebRTC basics to maximize deployment and adoption
Learn about the WebRTC basics in this essential guide, including the technology’s features, security concerns and use cases.

Related Terms

Related Tags
Communication integration with enterprise applications
Unified communications achitecture and service models

September 16, 2016  2:42 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
HTTPS, Security

HTTPS (HTTP over SSL or HTTP Secure) is the use of Secure Socket Layer (SSL) or Transport Layer Security (TLS) as a sublayer under regular HTTP application layering. Continued…

Quote of the Day

“Installing a digital certificate and providing users with the ability to make HTTPS connections to your Web server is one of the simplest ways you can add security to your website and build user confidence in conducting transactions with you over the Web.” – Mike Chapple

Learning Center
Google to tweak Chrome browser security in 2017, flag HTTP as insecure
Google plans to level up Chrome browser security by flagging unencrypted HTTP payment or login pages as insecure, starting in 2017.

Google boosts HTTPS, Certificate Transparency to encrypt Web
Google pushes HTTPS, Certificate Transparency log viewer and more support for Web encryption, as other tech firms eye expanding strong encryption.

HSTS: How HTTP Strict Transport Security enhances application security
Application security expert Michael Cobb reveals whether HTTP Strict Transport Security (HSTS) truly offers better application security than HTTPS.

What HTTP/2 means to the data center and its security
HTTP/2 responds to the need for less latency and higher performance when retrieving and exposing richer Web content. See what improvements come in the upgrade.

How can an HTTP referer header help maintain user Web privacy?
Learn the pros and cons of an HTTP referer header and discover why one can be critical to ensuring user Web privacy.

Related Terms
digital certificate
certificate authority

Related Tags
Web browser security
Network protocols and security

September 14, 2016  9:08 PM

KVM hypervisor

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Hypervisor, KVM, Virtualization

KVM hypervisor is the virtualization layer in Kernel-based Virtual Machine (KVM). In KVM, the Linux kernel acts as a Type 2 Hypervisor, streamlining management and improving performance in virtualized environments. Continued…

Quote of the Day

“Kernel-based Virtual Machine (KVM) contains virtualization extensions that boost security and performance, and allows organizations to deploy multiple VMs running unmodified Linux or Windows images.” – Jim O’Reilly

Learning Center
Will Nutanix’s KVM-based hypervisor shake up VMware?
Using a KVM-based hypervisor, Nutanix Acropolis is hitting VMware in the wallet for what many feel are exorbitant licensing fees.

Xen vs. KVM Linux virtualization hypervisors
Which side wins in the Xen vs. KVM Linux virtualization hypervisor debate? Two IT experts weigh-in with their Xen-KVM comparisons.

Quiz: KVM hypervisor and virtual infrastructure management
Take this quiz on the KVM hypervisor to test your knowledge on KVM virtual machine management and the differences between Xen and KVM virtualization.

Support for multiple hypervisors could solidify VMware’s future
As more companies work with Linux, it makes sense for VMware to consider KVM first if it wants to add management support for multiple hypervisors.

How end users can access VMs with virt-manager
End users using virt-manager to access virtual machines on a KVM hypervisor isn’t always convenient, but it’s not impossible.

Related Terms
Type 2 hypervisor

Related Tags
Open source virtualization
Virtualization technology and services

September 13, 2016  8:46 PM

ROT (redundant, outdated, trivial information)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Data quality

ROT (redundant, obsolete or trivial) is digital documentation that an organization continues to retain even though the information that is documented has no business or legal value. Continued…

Quote of the Day

“ROT is created very simply by hoarding information. It’s information that organizations hang onto with the mindset of keeping it ‘just in case.’” – Pamela Doyle

Learning Center
Big data doesn’t mean big intelligence … unless you work at it
For BI, big data can be a vital part of the range of data sources that each business department uses. However, the aim should be to make users smarter in their daily activities.

Too much business information? It’s not a new problem
The business information “explosion” has brought the problem into sharper relief, but there has long been too much data. Sorting through it is the real issue.

Content analytics becomes an enterprise must-have
As companies increasingly use content for an array of operations, they are recognizing that content analytics is central to improved operations.

How much data is too much for cloud gateways?
Enterprises with up to 50 TB of data may find public cloud storage attractive given the local storage limits of the current cloud gateways, says Gartner analyst.

Better data quality process begins with business processes, not tools
Efforts to improve the data quality process should start with an assessment of data problems and procedural changes to help avoid them, then the possible addition of data quality tools.

Related Terms
regulatory compliance
predictive coding
information governance

Related Tags
Data quality techniques and best practices
Managing governance and compliance

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: