“There is no single way to assemble and deploy images in a cloud environment. Golden masters work well in cases when image consistency is paramount; assembly on demand is a better option if you need to ensure machines are running the latest versions of software components.” — Dan Sullivan
Today’s WhatIs.com Word of the Day is golden image, a template for provisioning a particular configuration of a new virtual machine (VM), virtual desktop, server or hard disk drive. A golden image may also be referred to as a clone image, master image or stem-cell image.
“Too much information can be the death knell for social media data analysis initiatives. You have to be able to focus on what matters to the business’ bottom line when using these tools and not look at every mention of your product or brand.” — Seth Grimes
Today’s WhatIs.com Word of the Day is social media analytics.
“One of the most important things about the Hyper-V Replica feature is that it is designed solely as a disaster recovery feature and not a resiliency feature. If the primary server were to fail, Hyper-V does not automatically fail the virtual machines over to the replicas (for that, you would use failover clustering).” — Brien Posey
Today’s WhatIs.com Word of the Day is Hyper-V Replica, a virtual machine (VM) replication feature of Microsoft Hyper-V 3.0 that takes a snapshot every five minutes and moves a copy to a secondary host.
“Talent management tools are emerging that can facilitate and enhance searches for appropriate candidates on social media websites or the Web at large and then rapidly transfer the information into talent management software.” — Emma Snider
“SVC codecs adapt to sub-par network connections by dropping packets or portions of the encoded picture in a way that reduces the frame rate or resolution of the picture, which prevents the picture from breaking up.” — Stephen K. Campbell
Today’s WhatIs.com Word of the Day is scalable video coding (SVC). SVC is based on the idea of slicing individual frames into layers to provide quality video even when the endpoints only receive a certain percentage of the layered frames. A mobile phone, for example, might only receive the base layer.
“VXLAN, submitted to IETF in the Fall of 2011 and talked up at last year’s VMWorld, is a protocol for routing Layer 2 traffic over Layer 3 networks, with the goal of either expanding the available VLAN address space, or supporting inter-data center VM mobility, depending on who you ask. — Beth Pariseau
Today’s WhatIs.com Word of the Day is VXLAN (virtual extensible LAN), a protocol backed by Cisco, Citrix, Red Hat and VMware to make clouds more scalable while still isolating apps and tenants. Cisco is pushing the protocol’s scalability — it will allow up to 16 million virtual network IDs to be recognized at the same time, as compared to regular old VLANs’ measily 4,096 IDs. VMware is pushing the protocol’s potential to knock down VM migration boundaries.
“Adding Windows To Go to the [disaster recovery plan] mix just seems like added complexity, unless it’s a USB stick in a glass box labeled, “In case of emergency, break glass.” — Gabe Knuth
Microsoft is suggesting several uses for this feature, one of which is disaster recovery for small business. The scenario goes something like this: there’s a fire that destroys the office but luckily, all the employees have Windows To Go configured USB drives so they can just just plug the drives into their home computers and voila — the company is back in business. Of course, this scenario assumes that employees can access everything they need from the cloud. That’s just a minor detail, of course. (NOT!)
One small step for Windows 8, one giant step for the cloud DR.
“Whether we love it or hate it, phablets — devices that are larger than most smartphones and smaller than tablets — are here to stay.” — Raymond Wong
“Search engine optimization (SEO) is a legitimate practice to help elevate the ranking of webpages in a search engine’s results pages. However, it is also used by hackers to get webpages hosting malicious software ranked highly by search engines. Unsuspecting users are more likely to visit these malicious sites if they appear in the first page of results returned in a search. — Michael Cobb
Today’s WhatIs.com Word of the Day is search engines results page (SERP). There are three main types of results on a SERP: Pages that the search engine spider has crawled and indexed; pages that have been manually added to the search engine’s directory; and pages that appear as a result of paid inclusion.
“The main driver for ‘shadow IT’ is the typically difficult, protracted and bureaucratic process of acquiring resources…Some CIOs only find out their organization uses Amazon Web Services when there is an AWS outage.” — Shlomo Swidler
Today’s WhatIs.com Word of the Day is shadow IT, an adjective that describes hardware or software within an enterprise that is not supported by the organization’s central IT department. Although the label itself is neutral, the term often carries a negative connotation because it implies that the IT department has not approved the technology or even worse — doesn’t even know that employees are using it.