Word of the Day: Tech Definitions from WhatIs.com

March 10, 2017  8:05 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Ephemeral messaging, Snapchat

Snapchat is a mobile app that allows users to send and receive “self-destructing” photos and videos. Photos and videos taken with the app are called snaps. Continued…

Quote of the Day

“The company formerly known as Snapchat has been rebranded as Snap, Inc., and is entering the hardware market with the release of image-capturing sunglasses called ‘Spectacles.'” – Christian Stafford

Learning Center
Snapchat eyes the hardware market with new video-recording sunglasses
Snap, Inc., the company behind the popular photo and video messaging app Snapchat, is releasing a pair of photo and video-capturing glasses that have some worried about the possible privacy implications of such a device.

CES to CIOs: Watch out for wearable technology
This week’s Searchlight finds wearable technology looking and working better than ever. Plus, a tough lesson in how not to use email, the lure of ephemeral messaging and more.

Snapchat hack has users thinking twice
A recent hack into Snapchat, the social media platform for photo sharing, has users thinking twice about giving personal information to these services.

Twitter savvy health IT exec uses wearable tracking device
Twitter savvy healthcare system chief innovation officer uses smart wearable tracking device for fitness and sees wearables as important to health IT.

Book chapter: Social media security policy best practices
The following is an excerpt from chapter 6 Gary Bahadur from the book “Securing the clicks: Network security in the age of social media.”

Trending Terms
ephemeral messaging
show-me marketing
wearables OS
systems of engagement

Writing for BusinessI’m cleaning up my Facebook account, unfriending people I don’t know and the ones I wish I didn’t know that have somehow ______ in.
a. snuck
b. sneaked

March 9, 2017  3:02 PM

vulnerability management

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
vulnerabilities, vulnerability management

Vulnerability management is a pro-active approach to managing network security by reducing the likelihood that flaws in code or design could compromise the security of an endpoint or network. Continued…

Quote of the Day

“Organizations tackle the most severe vulnerabilities first and work their way down to the least severe as time and resources permit. Some vulnerabilities don’t pose a serious threat to the organization and may simply be accepted, which means they are not remediated.” – Ed Tittel

Learning Center
Introduction to vulnerability management tools
Vulnerability management tools can be an invaluable asset for enterprises. Here’s how vulnerability management software works to close security gaps.

Comparing the top vulnerability management tools
Expert Ed Tittel explores and discusses critical features of the top vulnerability management tools on the market.

Pentagon hack possible due to bad vulnerability management
A Pentagon hack may have already occurred because of flaws in DOD systems that have been unpatched for at least eight months.

Seven criteria for buying vulnerability management tools
Expert contributor Ed Tittel describes key purchasing criteria for vulnerability management tools for all types and sizes of organizations.

Best practices for an information security assessment
An information security assessment is a good way to measure the security risk present in your organization. Find out how to yield effective results.

Trending Terms
vulnerability management planning
vulnerability analysis
Common Vulnerability Scoring System
penetration testing
vulnerability scanner
vulnerability disclosure
hardware vulnerability
zero-day vulnerability

Writing for Business
The number of security holes found during the penetration test left _________ shaken.
A. the CSO and me
B. the CSO and I
C. the CSO and myself

March 7, 2017  5:19 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Desktop virtualization, Digital assistant, virtual, Virtualization

In computing, virtual is a digitally replicated version of something real. The replication, which is created with software, may not be an exact copy of the actual item, but it is similar enough, in essence, to be described as a digital rendition. Continued…

Quote of the Day

“The mindsets that used to limit which applications could be virtualized are mostly gone now via a combination of maturing administrators, more capable hardware and experience.” – Matthew Portnoy

Learning Center
Expert advice for companies hesitant to implement virtualization
Author of Virtualization Essentials, 2nd Edition, Matthew Portnoy, provides valuable information for those looking to implement virtualization.

Virtualization levels have peaked, so what’s next?
Virtualization levels may have peaked, but that doesn’t mean organizations should stop driving for further consolidation and efficiency savings.

IT resource management and virtual server housekeeping tips
Diligent IT resource management and regular housekeeping can help ensure you’re making the most of your server and storage investments.

Five ways a healthcare virtual assistant can improve patient engagement
Patients can use a voice-based healthcare virtual assistant as an education tool or to set medication and appointment reminders.

The rise of virtual workspace management tools
Virtual workspace management tools aggregate the many resources employees access and IT administrators manage, but such products aren’t right for every business.

Trending Terms
virtual private network
virtual asset
virtual manufacturing
virtual server
virtual memory

Writing for Business
The book “Virtualization for Dummies” provides a _________ explanation of virtualization that helps readers achieve a basic level of understanding.
A. simplified
B. simplistic

March 6, 2017  5:59 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cloud broker, middleware, Service Broker

A broker is someone or something that acts as an intermediary third party, managing transactions between two other entities. Continued…

Quote of the Day

“As you go into the cloud, you no longer need to buy hardware and software but only the hardware service and the software service, so system integration goes away, and it becomes service integration — and that service integration is what a cloud broker does.” – Kevin L. Jackson

Learning Center
Buying cloud access security brokers with confidence
IT security professionals assessing and buying cloud access security broker services will learn from this Buyer’s Guide how to evaluate the CASB products that service providers now offer.

Cloud brokerage: Are cloud brokers ‘tomorrow’s system integrators’?
The cloud brokerage market could reach $160 billion by 2018, and observers anticipate a lot of activity among cloud brokers and traditional IT companies in the next few years.

IT as a service: How to succeed as an IT broker
Is your organization moving toward offering IT as a service? Find out what CIOs and experts have to say about succeeding as an IT broker.

Cisco targets shadow IT with online cloud security broker
Cisco’s new cloud security broker helps organizations rein in the use of unauthorized online services that pose a security risk.

How internal IT can become a cloud services broker
The cloud is here to stay, and IT can’t afford to be against it. Tom Nolle explains how IT can become a public cloud services broker.

Trending Terms
ad network
data broker
cloud broker
connection broker

Writing for Business
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating

March 3, 2017  8:33 PM

fake news

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
fake news, social media

Fake news is an inaccurate, sometimes sensationalistic report that is created to gain attention, mislead, deceive or damage a reputation. Unlike misinformation, which is inaccurate because a reporter has confused facts, fake news is created with the intent to manipulate someone or something. Continued…

Quote of the Day

“Unlike other areas, where AI algorithms are successful, such as image recognition or natural language processing, there are fewer patterns to rely on with fake news.” – Ed Burns

Learning Center
Researchers work on AI algorithms to detect fake news
Artificial intelligence researchers are being challenged to come up with AI algorithms that can identify fake news, but is the technology ready?

Data trust gap confronts analytics — time to open the ‘black box’
To vault a data trust gap, there is a need to better explain what’s behind the recommendations that analytics tools make, according to KPMG’s Bill Nowacki.

The ‘supply chain of trust’ inherent to IoT data security
In this video interview, David Dufour of Webroot discusses why ensuring IoT data security begins with the connected device supply chain.

Putting the T in IoTT: The internet of trusted things
Without trusted data, we cannot act or bring about real change. In IoT, we have to close the loop in order to trust the data, trust the route and trust the information that is sent back.

Common biases that can taint analytics analysis
Businesses are increasingly using data to drive decisions, but these common biases can still muddle analytics analysis.

Trending Terms
distribution channel
discussion board
Internet shill
social media influence

Writing for Business
I was annoyed when my friend shared the Facebook post about the dangers of microwave ovens, but he didn’t know any better. It was just a case of ________.
A. misinformation
B. disinformation

March 2, 2017  7:55 PM

network engineer

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Cisco certifications, Network Engineer, Software defined networks

A network engineer is a technology professional who has the necessary skills to plan, implement and support the computer networks that support in-house voice, data, video and wireless network services. Continued…

Quote of the Day

“Good network engineers have always been developers; they quite literally write code every time they jump on a command line interface.” – Nick Buraglio

Learning Center
IT compensation rises for most certified and noncertified skills
Having skills tends to increase IT compensation, according to new pay index; the market for IoT services is expected to double by 2020.

What duties are included in a network engineer job description?
A network engineer job description will vary depending on whether the job involves engineering a new network or running an existing one.

Network engineer qualifications trump coding hype
Network engineer qualifications are shifting as SDN gains traction, but coding has long been a hallmark of the traditional network engineer job.

Network engineer job description will evolve, not evaporate, with SDN
The charge that networking pros must become programmers to survive is looking unrealistic. SDN will expand the network engineer’s job description, not invalidate it.

From consultant to enterprise network engineer: How to make the switch
One enterprise network engineer shares how she made the leap from a position as a network design consultant at a major vendor to her current role.

Trending Terms
Cisco Certified Network Associate
network fabric
software-defined networking
network hypervisor

Writing for Business
The survey results taught us that one in three network administrators ______ interested in learning more about software-defined networking.
A. was
B. were

March 1, 2017  10:29 PM

Secure Digital Extended Capacity (SDXC) card

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Flash memory, SD card

A Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that resembles an SD (Secure Digital) card but has far greater storage capacity. Continued…

Quote of the Day

“When it comes to maximizing the lifespan of your flash memory storage, one of the best things you can do is to focus on achieving the best possible performance.” – Brien Posey

Learning Center
Flash memory device transfers video from four memory cards at once
Lexar’s Professional Workflow Reader Solution flash memory device transfers video and images from up to four memory cards at once via just one USB port.

Four tips to maximize the lifespan of your flash memory storage
Brien Posey explains why many activities that improve storage performance also help to extend your flash memory storage longevity and reduce long-term storage costs.

Flash storage 101: How solid state storage works
Why flash writes are troublesome, why endurance is limited and what suppliers are doing to overcome these issues.

Flash memory vs. RAM: What’s the difference?
Many users question flash memory vs. RAM — the first is storage and the second is the main memory of your PC or server.

Flash technologies remain hot in 2016, experts predict
Storage veterans predicted flash technologies will stay hot in 2016, as solid-state arrays will outsell disk systems and SSDs will lead to the demise of high-speed HDDs.

Trending Terms
flash memory
Secure Digital card
data transfer rate
secondary storage
nonvolatile memory

Writing for Business
_____ USB drive offers a lot of advantages over older portable storage devices.
A. A
B. An

February 28, 2017  10:39 PM

personality profile

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Emotional intelligence, Knowledge management, Soft skills

A personality profile is a knowledge management tool that is used to evaluate an employee’s personal attributes, values and life skills and maximize his or her job performance and contribution to the company. Continued…

Quote of the Day

“Finding the right skill set for a startup team is not nearly as difficult as hiring the right personality.” – Bryan Barringer

Learning Center
IT career advancement: The move to management
As businesses continue to embrace technology as a strategic advantage, IT career advancement will largely rely on the development of untapped skills.

IT Management Staffing Tip: Knowing Your Personality Types
The Myers-Briggs personality tests helped one IT team align with the business

Personality Test: What kind of geek are you?
A geek personality test: Are you more likely to hum Anchors Aweigh or My Way? Find out what famous geek you resemble.

Hire for personality, not just skills, to build your startup team
A detailed skills inventory can help guide you when hiring your startup team, but the personality mix matters even more, says entrepreneur Bryan Barringer.

What are the traits of a successful project manager?
Successful project managers come in all varieties, but they all have some common traits that contribute to getting the job done. Lawrence Oliva explains what those traits are.

Trending Terms
leadership traits
emotional intelligence
knowledge management
soft skills
T-shaped employee
cultural fit

Writing for Business
Personality profiling, in theory at least, should ensure that _____ traits are a good fit for a position.
A. one’s
B. ones

February 27, 2017  4:46 PM

citizen development

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
BYOA, Shadow IT

Citizen development is a low code approach to software development that allows people to create software programs without needing to know anything about programming languages or how to write code. Continued…

Quote of the Day

“A citizen developer using rapid mobile app development tools can get a foundation for an app in place before a qualified developer steps in.” – Eddie Lockhart

Learning Center
How low-code development makes building mobile apps easier
It’s a mobile world, but unfortunately, the apps are hard to build and developers are scarce. Low-code development platforms are the answer.

The citizen developer has arrived
A citizen developer using rapid mobile app development tools can get a foundation for an app in place before a qualified developer steps in.

Why (and how) the citizen developer is going to be your new BFF
Citizen developers are making more customer-facing applications faster than ever before. And they’re helping traditional developers with the backlog.

Why 2017 looks like a year of change for software development jobs
Software development jobs are changing, as new tools empower departmental citizen developers. Are Agile and DevOps laying the groundwork for more change?

Citizen developers pull the rug out from under IT with RMAD tools
RMAD tools spur the trend of citizen developers in the enterprise, as professionals are impatient with IT taking too long to deliver mobile business apps.

Trending Terms
IT consumerization
shadow IT
mobile application development platform

Writing for Business
A citizen developer can help companies ________ to changing business needs by creating simple solutions with minimal involvement from IT.
A. adopt
B. adapt

February 24, 2017  10:40 PM

assembly line

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
ERP, Lean processes, Manufacturing

An assembly line is a production methodology that breaks a process down into discrete steps that are executed in an iterative manner. Continued…

Quote of the Day

“A few years ago, I had the opportunity to tour the General Motors assembly plant, and I saw many parallels to what I do as a programmer and system administrator. It was a lesson in efficiency and just-in-time resource delivery that is applicable to both the assembly plant and IT.” – Mark Vaughn

Learning Center
Car assembly plants can teach a valuable lesson in IT automation
Just as manual automation helps car assembly plants build their products, IT automation can enable businesses to run more efficiently.

How lean production systems cut the fat out of manufacturing, ERP
A lean production system says efficiency is king and waste should be eradicated. Over time, ERP has evolved to work better and better with lean techniques.

IoT technologies bring efficiency and customization to manufacturing
Companies like KUKA Robotics are using IoT technologies to automate assembly line manufacturing, as well as customize production to meet customer expectations.

Manufacturing requirements planning: The four critical questions answered
Read a book excerpt on manufacturing requirements planning (MRP) and the common pitfalls of MRP. Understand why the book’s authors say that MRP must become more flexible to stay relevant in today’s manufacturing environments.

Improve operations with lean manufacturing techniques, ERP
By combining lean manufacturing techniques and ERP, and taking advantage of other methodologies, organizations can streamline and improve operations.

Trending Terms
IT automation
lean production
JIT manufacturing
labor automation

Writing for Business
The set of practices in the ten rules of lean production ______ been adopted by many industries in the U.S. and Europe.
A. have
B. has

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: