Word of the Day: Tech Definitions from WhatIs.com

January 25, 2017  8:50 PM


Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert
Internet of Things, MEMS

A MEMS (microelectromechanical system) is a miniature machine that has both mechanical and electronic components. Continued…

Quote of the Day

“IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS) and the internet.” – Warwick Ashford

Learning Center
UK more than doubles funds to build internet of things
UK government more than doubles funding for technology companies making devices that communicate over the internet.

Smart dust could be magic for IT
“Smart dust” devices are tiny wireless sensors that can detect everything from light to vibrations. Thanks to recent manufacturing breakthroughs, applications could range from monitoring temperature and humidity or tracking enemy movements in a military operation.

Asean countries consider IoT for smart farming
Malaysia is leading the way when it comes to using internet of things technologies to improve agriculture.

Plexxi integrates SDN with Calient’s 3D MEMS optical switch
By integrating with Calient’s 3D MEMS optical switch, Plexxi has added dynamic, any-to-any interconnection to its software-defined networking technology.

2013 networking industry outlook: Network fabrics can’t kill spanning tree
451 Research’s Erica Hanselman makes predictions for the networking industry in 2013. Network fabrics won’t kill spanning tree; enterprises will look at Ethernet exchanges for hybrid cloud.

Trending Terms
smart dust
control network

Writing for Business
Advantages of MEMS sensors are their size and their ability to be more closely integrated with their associated _______ devices.
A. electronic
B. electric

January 24, 2017  10:17 PM

hybrid cloud storage

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud storage, Hybrid cloud

Hybrid cloud storage is an approach to managing storage that uses both local and off-site resources. Continued…

Quote of the Day

“By offering lower costs, higher performance and reduced data loss, hybrid cloud helps some organizations optimize their tiered storage systems.” – David Linthicum

Learning Center
Breaking down the costs of cloud storage
The costs of cloud storage are tricky to navigate and can add up quickly. Take a closer look at how location, capacity and service types accrue costs.

Hybrid cloud 101: Using the cloud as a storage tier
We look at what’s possible when it comes to hybrid cloud, what types of data and what hybrid cloud architectures can combine on-premise and cloud storage capacity.

How to avoid common hybrid cloud implementation mistakes
Choosing the wrong public cloud and on-premises storage can have disastrous consequences, but these hybrid cloud implementation mistakes are easy to avoid.

Hybrid cloud implementation preparation checklist
Before undertaking a hybrid cloud implementation, ensure your on-premises environment is fully prepared using this comprehensive checklist.

Hybrid cloud benefits driving future of cloud storage
Storage vendors are offering products that acknowledge hybrid cloud benefits by accommodating on-premises storage but also allow for access to data stored externally.

Trending Terms
application program interface (API)
cloud storage appliance
tiered storage
hyper-hybrid cloud

Writing for Business
When using cloud storage to ________ local storage, an important factor to consider is how data will be transported to the cloud storage provider.
A. complement
B. supplement

January 23, 2017  8:05 PM

Affordable Care Act

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Affordable Care Act, HIPAA

The Affordable Care Act (also known as ACA or Obamacare) is legislation passed in 2010 that changed how Americans enroll in and receive healthcare coverage. Continued…

Quote of the Day

“As the nation moves past a divisive election season, we must continue working together to build a better healthcare delivery system.” – Russell Branzell

Learning Center
Experts say how Trump presidency might affect the future of health IT
Health IT experts discuss the future of health IT under the Trump administration. They offer up predictions and reassurances for the future.

John Sculley: optimize transaction cycle for pharmaceuticals
The transaction cycle for prescription drugs can be optimized by using collaborative cloud technology, according to former Apple and Pepsi CEO John Sculley.

Why the ACA makes information security in healthcare more challenging
Information security in healthcare settings is a big challenge already, but expert Joseph Granneman says the ACA’s focus on data storage will only make it tougher.

How predictive analytics in healthcare can lower readmissions
Health systems have had a few years now to learn how to apply predictive analytics in healthcare to combat the problem of readmissions.

How the Supreme Court’s Affordable Care Act ruling hits the HIT world
HIT leaders learn what to do next after the U.S. Supreme Court’s Affordable Care Act ruling.

Trending Terms
Office for Civil Rights
US Dept. of Health and Human Services

Writing for Business
Under the ACA, there are tax credits for individuals, families, and small businesses in order to _____ that insurance is affordable for everyone.
A. assure
B. ensure
C. insure

January 20, 2017  6:21 PM

change control

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Change control management, Change management

Change control is a systematic approach to managing all changes made to a product or system. The purpose is to ensure that no unnecessary changes are made, that all changes are documented, that services are not unnecessarily disrupted and that resources are used efficiently. Within information technology (IT), change control is a component of change management.

The change control process is usually conducted as a sequence of steps proceeding from the submission of a change request. Typical IT change requests include the addition of features to software applications, the installation of patches, and upgrades to network equipment. Continued…

Quote of the Day

“Change is scary; we get used to one way, and we know that changes normally don’t go smoothly. In the IT world, both IT staff and end users get upset when things change.” – Adam Fowler

Learning Center
Real-life change management examples prove it’s harder than it looks
These change management examples illustrate the dangers of change, the importance of communication and the options IT shops have to get it right.

Could IT change control have prevented an IT deployment failure?
IT change control fails for common reasons, including fear of the unknown. Bring IT configurations into spec with these practical guidelines.

Maintaining compliance in a world of constant change
Four steps information security practitioners can take to ensure their compliance efforts are maintained.

Neglecting change control can kill a DR plan
This tip discusses the impact of change control (or lack thereof) on disaster recovery and offers some best practice information.

Using control change management to improve attack resistance
Learn how control change management can free your enterprise from the “widget mentality” — and ensure better attack resistance.

Trending Terms
organizational change management
change data capture
application lifecycle management
change management
change request
feature creep

Writing for Business
As change is constant, you should have a process for ______ improvement of your controls and compliance efforts.
A. continual
B. continuous

January 19, 2017  4:39 PM

Cloud Security Alliance (CSA)

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Cloud Security

The Cloud Security Alliance (CSA) is a nonprofit organization that promotes research into best practices for securing cloud computing and the ability of cloud technologies to secure other forms of computing. The industry group also provides security education and guidance to companies implementing cloud computing and helps vendors address security in their software delivery models. CSA membership is open to any interested parties with expertise to contribute to the security of cloud computing.

The CSA leads a number of ongoing research initiatives through which it provides white papers, tools and reports to help companies and vendors secure cloud computing services. The CSA GRC Stack, for example, provides a toolkit for assessing private and public clouds against industry-established security best practices. The CloudAudit project seeks to simplify the process of gathering audit data by creating a standard way for cloud providers to communicate how they address security, governance and compliance.

The CSA Security, Trust & Assurance Registry (STAR) program for security assurance in the cloud seeks to reduce or eliminate the per-relationship cost for the provider and customer and increase the consistency of evaluations from assessor to assessor. The basic premise of STAR is that a service provider can voluntarily undertake an objective assessment of its own environment, publish it to a registry and allow the results to be viewed by existing, new, and potential customers. Continued…

Quote of the Day

“Cloud customers can be tempted to ignore isolation attacks. This is problematic in the face of a situation like Flip Feng Shui.” – Ed Moyle

Learning Center
How the Flip Feng Shui technique undermines cloud security
Flip Feng Shui leverages Rowhammer and memory deduplication to exploit hypervisors. Here’s what enterprises need to know about it.

CSA cloud metrics validate perceptions on cloud computing risk
Cloud Security Alliance recently released a study revealing in-depth data on cloud adoption and influences. The CSA cloud market maturity study also examined cloud business risk.

Can the Cloud Security Alliance help with comparing cloud providers?
Cloud security expert Dan Sullivan explains how the Cloud Security Alliance’s Privacy Level Agreement for Europe v2 can help U.S. companies with comparing cloud providers.

An introduction to cloud computing security certifications
SearchCloudSecurity’s guide to cloud computing security certifications looks at the top vendor-specific and vendor-neutral cloud security certifications.

CSA Guide to Cloud Computing
In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA’s Top Threats Working Group.

Trending Terms
Trusted Cloud Initiative
software-defined perimeter
CloudTrust Protocol
Cloud Controls Matrix

Writing for Business
The Cloud Security Alliance (CSA) has worked with European officials to support implementation of the ______ privacy laws and regulations.
A. Unions’
B. Union’s

January 17, 2017  7:39 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
ChatOps, Slack

Slack software is cloud-based collaboration software. Originally founded in 2009 as a chat tool for a now-defunct gaming technology, Slack has gained currency among enterprises and is broadening into a collaboration platform with capabilities beyond just messaging. Continued…

Quote of the Day

“As Google continues to regroup after Google+ proved unsuccessful as a general-purpose collaboration environment, it too may find Slack an attractive acquisition candidate.” – Peter O’Kelly

Learning Center
Slack courts developers in team collaboration tools race
Slack is boosting its competitive edge in the team collaboration tools space by offering money to developers who build Slack-first integrated applications.

Team chat apps: Please talk amongst yourselves
Team chat apps such as Slack and Cisco Spark can play an important role in providing a sense of cohesion within organizations.

Slack kicks up dust in collaboration software tool market
Today, Slack is largely an alternative to email and instant messenger. But integrations with Box and other services show a collaboration software tool strategy on the horizon.

Slack vs. Microsoft Teams: Which is best for enterprise collaboration?
Both Slack and Microsoft Teams are trying to gain the upper hand among workers as the leading enterprise collaboration platform.

Why Slack collaboration catches on where others can’t
The Slack collaboration tool features fit many business users’ work processes and integrates with other apps.

Trending Terms
collaboration platform
enterprise collaboration
Microsoft Teams

Writing for Business
Management chose Slack to encourage communication ________ the company’s marketing team and its sales team.
A. between
B. among

January 16, 2017  9:44 PM

predictive analytics

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Deep learning, Predictive Analytics, predictive modeling

Predictive analytics is a form of advanced analytics that uses both new and historical data to forecast future activity, behavior and trends. Continued…

Quote of the Day

“The 2016 U.S. presidential election shined a light on the imperfections of predictive models, and their failure to predict its outcome will have an impact on enterprises in 2017.” – Dan Magestro

Learning Center
International Institute for Analytics’ five analytics predictions
The International Institute for Analytics offers up five analytics predictions for 2017.

Predictive analytics in healthcare helps manage high-risk patients
Advanced Plan for Health uses predictive analytics in healthcare to help keep populations healthy as well as help organizations reduce costs.

The trouble with predictive analytics tools
Predictive analytics tools are hailed as the way to increase sales and reduce operational costs. But first, you need to understand what the data indicates.

Don’t let a data-driven approach ax judgment from analytics equation
A data-driven approach to analytics isn’t foolproof. Data scientists and business users have a role to play in assessing the results of analytical models.

Events of 2016 put strain on predictive analytics algorithms
As the world becomes a less predictable place, businesses need to rethink how they implement predictive analytics algorithms in their operations.

Trending Terms
deep learning
prescriptive analytics
predictive personalization
descriptive analytics
predictive modeling
decision tree

Writing for Business
Neither of the content analytics applications _____ backwards compatible.
A. is
B. are

January 12, 2017  9:23 PM

snackable content

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Content Management, Enterprise content management

Snackable content is website content that is designed to be easy for readers to consume and to share.  Continue…

Quote of the Day

“Snackable content is bite-sized, immediately accessible and tuned to your current contexts.” – Geoffrey Bock

Learning Center
Five snackable content ingredients that add flavor to UX
Mobile users need bite-sized content that’s immediately accessible and contextually relevant. Find out how to develop this snackable content.

Content is still king in social media strategy
For media companies like ESPN and Turner Sports, social media strategy is all about placing content front and center, not sending out vapid tweets.

Enterprise content management trends
Technology trends like mobility could disrupt the ECM software market. Check out the 2014 enterprise content management trends that are poised to be game changers.

How can mobile strategy create better digital experiences?
Mobile Web experiences are shifting from a publishing environment to delivery of interactive digital experiences, making information architecture key to mobile strategy.

Is the Drupal content management system right for your business?
The Drupal content management system is open source software that provides users of all skill levels with tools for content development and organization.

Trending Terms
native advertising
gated content/ungated content
intelligent content
dot com disclosures
content generation software
structured content

Writing for Business
Snackable content, _____ Twitter posts, infographics and video clips, can be consumed quickly.
A. i.e.
B. e.g.

January 11, 2017  8:06 PM

exploit kit

Margaret Rouse Margaret Rouse Profile: Margaret Rouse
malware, Threat actor

An exploit kit is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware. Continued…

Quote of the Day

“Exploit kits make the job of an attacker much easier but can be defended against easily by understanding the vulnerabilities and software they most often target.” – Michael Heller

Learning Center
Five tips for preventing a hospital ransomware attack
Cyberattacks against healthcare organizations are projected to increase in 2017, but these five tips can help IT prevent a hospital ransomware attack.

Exploit kit delivered via malvertising targets unpatched systems
The Stegano exploit kit is now being delivered in a malvertising campaign and has been targeting unpatched systems.

Crypto ransomware lurks in ads on popular websites
Security researchers warn that the major ransomware malvertising campaign that hit popular websites at the weekend may not be over yet.

Exploit kits evolved: How to defend against the latest attack toolkits
How are the biggest automated exploit kits evolving and what can enterprises do to defend against the latest methods employed by these attack toolkits? Expert Nick Lewis discusses.

How to track and prevent crimeware attacks
Preventing crimeware is imperative, especially as attacks are financially motivated. Enterprises need to look at the incidents and launch a formal investigation to prevent crimeware attacks.

Related Terms
threat actor
drive-by download
attack vector

Related Tags
Malware, viruses, trojans and spyware
Hacker tools and techniques, underground sites and hacking groups

January 10, 2017  10:32 PM


Margaret Rouse Margaret Rouse Profile: Margaret Rouse
Artificial intelligence, Deep learning, Machine learning

Mechatronics is a branch of engineering that focuses on designing, manufacturing and maintaining products that have both mechanical and electronic components. Continued…

Quote of the Day

“In the past we referenced this collection of [engineering] disciplines as systems engineering, but the term mechatronics is capturing more traction now.” – Jim Devaprasad

Learning Center
3D technologies promise new age of smart, ‘augmented’ product design
Read why some experts say the 3D technologies of 3D scanning, imaging, modeling and printing will transform how products are designed and manufactured

Artificial intelligence implementation: Getting past barriers
Learn about the obstacles to artificial intelligence implementation and how to convince the C-suite to invest in the technology.

Tom Davenport: Getting started on enterprise AI
Enterprise AI is coming to an IT department near you. In this Q&A, Tom Davenport talks about how CIOs can prepare.

Embedded systems and SOA: Strange bedfellows get closer as systems of systems
As the world becomes more computerized, embedded systems and enterprise systems are becoming intermixed.

Manage vendor access for industrial control systems security
Does your company have explicit rules and expectations for vendors to follow when they connect to your industrial control system?

Related Terms
mechanical engineering software
machine learning
machine vision
embedded system
systems thinking

Related Tags
IoT APIs, applications and software
Enterprise artificial intelligence

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: