Word of the Day: Tech Definitions from WhatIs.com


May 12, 2017  6:20 PM

privilege creep

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Identity & Access Management

Privilege creep is the gradual accumulation of access rights beyond what an individual needs to do his job. Continued…

Quote of the Day

“Manually trying to manage a large number of users’ privileges is a time-consuming and resource-draining process and will lead to mistakes and oversights.” – Michael Cobb

Learning Center
Enlightened shadow IT policy collaborates with users
A shadow IT policy that manages risk has to change with the times, as cloud services offer users easy access to necessary apps.

Shadow apps in the cloud threaten IT data governance
Deploying cloud apps can take far less time than going through IT to do the same work on premises. But these shadow apps cause IT data governance issues.

Beyond shadow IT risks, opportunity awaits
Shadow IT risks pose a threat to the enterprise, but, when properly managed, the use of unsanctioned apps can lead to new cloud computing innovations.

Build a shadow IT strategy all departments will love
To build a successful shadow IT strategy, IT pros must remember that, in many cases, shadow apps meet a business need that existing IT systems don’t.

Shadow IT cited as reason why some firms lack formal cloud strategy
New research from VMTurbo suggests firms are using cloud, even if they claim not to have a formal private or public deployment plan in place.

Trending Terms
feature creep
identity access management (IAM) system
access governance (AG)
access recertification
privilege escalation attack

Writing for Business
I’ve saved the folder to Dropbox and will send the link to _________.
a. he and Charles
b. him and Charles
c. Charles and he
d. Charles and him
Answer

May 10, 2017  4:17 PM

one-time password token (OTP token)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
multifactor authentication, OTP, Password authentication

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. Continued…

Quote of the Day

“Strong authentication methods typically involve dynamically generated OTPs or certificate- and context-based authentication.” – Dan Sullivan

Learning Center
Multifactor authentication: A buyer’s guide to MFA products
Learn about the evolution of multifactor authentication technology, as well as how to procure and buy the right MFA products for your organization.

Strong authentication methods: Are you behind the curve?
Why don’t more enterprises adopt strong authentication methods? The answer may lie in uncertainty about implementation strategies and costs.

FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long term solutions to the challenges of effective and secure authentication.

Why mobile two-factor authentication is better than biometrics
By adding a second criterion to device access, mobile two-factor authentication makes it much more difficult for hackers to access users’ devices.

Authentication in the cloud: Are more open standards the answer?
Cloud security expert Rob Shapland explains how open standards such as FIDO, SAML and OpenID can help ensure secure user authentication in the cloud.

Trending Terms
key fob
multifactor authentication
two-factor authentication
Google Authenticator
FIDO

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


May 9, 2017  6:46 PM

OpenShift

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
OpenShift, Red Hat

OpenShift is RedHat’s cloud development Platform as a Service (PaaS). The free and open source cloud-based platform allows developers to create, test and run their applications and deploy them to the cloud. Continued…

Quote of the Day

“OpenShift spans a broad swath of new technologies, such as containers, software-defined storage and software-defined networks, but also requires skills in administering VMs and server hardware in on-premises deployments.” – Beth Pariseau

Learning Center
Signs point to cloud future at Red Hat Summit 2017
At Red Hat Summit 2017, the open source software company made overtures toward cloud computing.

Delving into the container-based Red Hat PaaS, OpenShift
The Red Hat PaaS, OpenShift, combines Docker and Kubernetes features to provide app dev teams container management and orchestration capabilities.

IT pros strive to embrace OpenShift container portability advances
Red Hat and Amazon Web Services focus on container portability in OpenShift collaboration, signaling a multicloud and hybrid cloud roadmap.

Red Hat OpenShift opens doors for container-based mobile app dev
Red Hat OpenShift and AWS announced a new collaboration at the Red Hat Summit that could make mobile app deployment easier for developers.

Create a PaaS model for application portability
A PaaS model offers operational simplicity, but can present lock-in risks. Evaluate these four options to make your PaaS environment portable.

Trending Terms
Red Hat
PaaS
open source
cloud computing
Cloud Foundry

Writing for Business
Open source describes any software whose source code is in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license
Answer


May 8, 2017  1:34 AM

Signaling System 7 (SS7)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Networking, Security

Signaling System 7 (SS7) is an international telecommunications standard that defines how network elements in a public switched telephone network (PSTN) exchange information over a digital signaling network. Continued…

Quote of the Day

“Everyone’s accounts protected by text-based two-factor authentication, such as bank accounts, are potentially at risk until the FCC and telecom industry fix the devastating SS7 security flaw.” – Rep. Ted Lieu (D-Calif.)

Learning Center
SS7 vulnerability allows attackers to drain bank accounts
An SS7 vulnerability was exploited to steal money from German bank accounts. Plus, an Intel AMT flaw exposes millions to security risk and more.

Can eavesdropping over the SS7 protocol be prevented?
Researchers have found the SS7 protocol used for phone communications is insecure. Can the threat be mitigated?

Security flaw exposes billions of mobile phone users to eavesdropping
Hackers, fraudsters, rogue governments and unscrupulous commercial operators are exploiting flaws in the architecture of the mobile phone signaling system known as SS7.

Mobile phone users at risk as hackers bug and track victims
An investigation by an Australian TV show demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements.

Trending Terms
PSTN
out-of-band signaling
man-in-the-middle attack
SS7 attack
SIGTRAN
in-band signaling

Writing for Business
The seminar covered an introduction to the _________ wireless protocols.
a. principal
b. principle
Answer


May 5, 2017  9:00 PM

behavior-based security

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Breach detection, Phishing, Security

Behavior-based security is a proactive approach to managing security incidents that involves monitoring end user devices, networks and servers in order to flag or block suspicious activity. Continued…

Quote of the Day

“The behavior-based security systems find things that were previously hidden — like something a software engineer is using or connecting to that is a bit sketchy.” – Niel Nickolaisen

Learning Center
As long as the workforce is human, IT security education will fall short
The human condition pretty much guarantees that IT security education will fail to protect the enterprise, CTO Niel Nickolaisen said.

How a hybrid whitelisting-blacklisting approach can help enterprises
Application whitelisting isn’t enough. Here’s why a hybrid whitelisting-blacklisting approach is best for enterprise security.

User behavioral analytics tools can thwart security attacks
InfoSec pros purchasing user behavioral analytics tools need to consider key features, deployment strategies and reasonable performance expectations.

Behavioral threat assessment means real-time threat detection
A behavioral threat assessment tool that provides real-time threat detection may be just what your enterprise security system needs now.

Tackle endpoint defense issues to obtain the best endpoint security
We’re well past a blind reliance on antivirus scanning at the endpoint, but there’s also not yet consensus on which next steps will bring are a must and which are just nice to have. Here’s your guide through the endpoint thicket.

Trending Terms
behavior whitelisting
phishing
malware
breach detection system
user behavior analytics
adaptive security

Writing for Business
Most major security breaches ____________ human error.
a. can be attributed to
b. are due to
Answer


May 4, 2017  6:54 PM

walking skeleton

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agile, Solution Testing, Unit testing

A walking skeleton, in the context of software development, is a minimal initial implementation of an application’s architecture that includes and connects the basic components of the system. Continued…

Quote of the Day

“By using test-driven development and continuous integration effectively, you can ensure not only your application is high quality, but your unit tests are high quality as well.” – Matt Heusser

Learning Center
Effective test-driven development and continuous integration
In this tip, Matt Heusser explains maintenance considerations when using test-driven development and continuous integration in a development environment.

Five things to know about the future of microservices and IoT
There’s a perfect storm brewing in IoT that will push microservices into new and traditional industries. The benefits are high and risks are low.

Use Agile software testing principles to plan your tests
Two Agile software testing approaches — testing quadrants and the test automation pyramid — will put you on your way to creating a solid strategy to fully test your applications.

Test your knowledge on code refactoring
Do you know how to refactor effectively? This quiz will put your knowledge of code refactoring to the test.

Using API Blueprint and Dredd for stronger, test-driven documentation
Zachary Flower lays out the benefits of test-driven development and explains how API Blueprint and Dredd can help.

Trending Terms
source code
test-driven development
unit testing
refactoring
agile software development
continuous integration

Writing for Business
Test coders will develop scenarios and exercises to test new code _________________
a. (after each unit is written).
b. (after each unit is written.)
Answer


May 3, 2017  7:08 PM

Salesforce Einstein

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Artificial intelligence, Salesforce.com

Salesforce Einstein is artificial intelligence (AI) technology that has been developed for the Salesforce Customer Success Platform. Continued…

Quote of the Day

“Einstein is only going to be as good as they tune the algorithms for their use cases to be. One set of rules doesn’t apply to all people. When AI can start to understand our personalities, I think we have a winning situation.” – Alan Lepofsky

Learning Center
What the Einstein-Watson merger means for Salesforce and IBM
The Salesforce and IBM team up between Einstein and Watson will shake up the cloud AI market, explains expert Scott Robinson.

Speculation abounds over features of Salesforce Einstein
Speculation abounds about the features and purpose of Salesforce Einstein. You’ll learn more in September and at Dreamforce in October.

Salesforce upgrades include heavy dose of Einstein
Salesforce upgrades bring AI functionality to its cloud products, but questions remain whether companies with unorganized or little data can take advantage.

Three ways Salesforce Einstein can enhance workplace analytics
Can Salesforce Einstein make an impact on routine business operations? Expert Scott Robinson looks at three ways the AI platform can affect workplace analytics.

Einstein-Watson merger seen enhancing AI, customer sentiment analysis
AI, BI and big data coupled with social media sentiment analysis tools show potential for marketing automation and next-generation sales.

Trending Terms
AI
predictive analytics
Salesforce Customer Success Platform
machine learning
deep learning
CRM

Writing for Business
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
A. except
B. accept
Answer


May 2, 2017  8:42 PM

stateless app

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Application containerization

A stateless app is an application program that does not save client data generated in one session for use in the next session with that client. Continued…

Quote of the Day

“Stateless apps can scale more gracefully in containers, which are a perfect fit for microservices.” – Beth Pariseau

Learning Center
IT industry grapples with Docker container persistent storage
Enterprises are mostly perplexed about Docker container persistent storage, as startups strive to earn their trust.

Stateful applications spark container management debate
Stateful applications are the subject of container management controversy, as enterprises move third-party and legacy apps to new IT architectures.

Container technology’s role in storage
Container technology is starting to be deployed more often in data centers today. Now companies should focus on container storage.

Working with microservices framework still a challenge in 2016
Tom Nolle examines how the microservices framework evolved in 2016 and the impacts it has had on enterprise development efforts.

Application containers continue data center invasion
The movement behind application containers doesn’t appear to be slowing down anytime soon, but rather is picking up steam.

Trending Terms
containerization
horizontal scalability
offline first
Elastic Load Balancing
persistent storage

Writing for Business
In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application’s computing needs.
A. less
B. fewer
Answer


May 1, 2017  4:04 PM

DevOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Agile development, DevOps

DevOps is the blending of tasks performed by a company’s application development and systems operations teams. Continued…

Quote of the Day

“To us, what DevOps means is that operations and development work very closely together and still have different roles, but are way more highly interconnected on the same team.” – Stephen Massalt

Learning Center
As DevOps matures, IT ops evolve into an IT service provider
IT operations is increasingly taking on the role of internal IT service provider, serving an organization’s app development teams as DevOps matures.

Five DevOps principles to apply to enterprise architecture
This article examines five key DevOps principles to follow in an enterprise architecture model, including tooling, staffing and framework considerations.

Storage plays catch-up with DevOps environment
The rise of the DevOps environment has seen the emergence of new storage technologies that offer specific features appropriate for Agile development.

Totally automatic: Improve DevOps and security in three key steps
Combining DevOps and security is possible; learn three key steps in this article by Nemertes Research CEO Johna Till Johnson.

Can DevOps help us save lives?
A technology evangelist is concerned about burnout among software developers, and explains how DevOps may be able to help.

Trending Terms
quality assurance
waterfall model
continuous software development
continuous delivery
agile software development
microservices

Writing for Business
Once the business owner saw the benefits of attending an ______________ improved.
A. Agile retrospective, his participation
B. Agile retrospective his participation
Answer


April 28, 2017  2:15 PM

group think

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Group think (also spelled groupthink) is a phenomenon that occurs when group’s need for consensus supersedes the judgment of individual group members. Continued…

Quote of the Day

“It’s easy for collaboration to become groupthink in close-knit Agile teams, because the desire for fast consensus can be strong.” – Gerie Owen

Learning Center
What’s the latest DevOps challenge? A tendency toward groupthink
Here’s a new DevOps challenge: groupthink. Some DevOps groups get along so well they are unable to see new ideas, according to expert Gerie Owen.

Agile teamwork: When collaboration becomes groupthink
Quality assurance consultant Gerie Owen discusses how Agile teamwork can lead to groupthink if not tempered by Container Difference Exchange.

Who is to blame for bad coding? Time to look in the mirror
Sometimes bad coding comes from bad decision-making, and worse. Expert Gerie Owen explains how to get out of the cycle of self-inflicted problems.

What is collaboration and why is it important to Agile methodologies?
We hear a lot about “collaboration” being an important part of Agile methodologies, but what exactly is the meaning of collaboration and how does it fit in with software development?

The need for IT innovation leads to aggressive collaboration
CIOs should bring the brains together from all parts of the business to achieve IT innovation.

Trending Terms
collaboration
decision management
DevOps
Agile project management
cognitive bias

Writing for Business
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: