Word of the Day: Tech Definitions from WhatIs.com


May 8, 2018  7:04 PM

mobile productivity app

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A mobile productivity app is a software program that allows smartphone, tablet and wearable device users to perform essential day-to-day tasks. Continued…

Quote of the Day

“Mobile apps make sense for field service workers because they rely on portability and ease of use. These types of employees are rarely in the office, so mobile is often the best way to equip them with the tools they need.” – Harpreet Ahluwalia

Learning Center
Field service mobile apps offer usability, new features
Service companies and mobility have always been a good match, but now field service mobile apps are expanding to include more advanced features such as AR and predictive analytics. Find out how smaller businesses can take advantage of these systems.

AI, security shape mobile app development trends in 2018
Curious about the top mobile app development trends in 2018? Expect artificial intelligence, augmented reality and security to play a big role.

Real-world ways mobile apps boost employee productivity
Mobile applications can be the key to increasing employee productivity, but it’s important for IT to find a way to measure their real-world value for workers.

Pros and cons of AI for mobile IT
Mobile administrators will see the pros and cons of AI in the next few years. Find strategies to take advantage of AI and navigate the problems it may pose.

Four ways to break through mobile business strategy barriers
A mobile business strategy can get organizations’ mobile efforts off the ground while avoiding common roadblocks. Find out four ways to do just that.

Trending Terms
employee productivity
productivity software
MPaaS
device-agnostic
mobile device management
enterprise mobility

Writing for Business
I prefer native apps ___ Web apps because they’re customized for my smartphone.
A. than
B. to
Answer

May 7, 2018  6:39 PM

competitive advantage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Competitive advantage is the favorable position an organization seeks in order to be more profitable than its rivals. Continued…

Quote of the Day

“Wasting project team time today is more significant than just a few years ago. In the current digital era, competitive advantage is based on speed.” – Zeus Kerravala

Learning Center
Corporate IT rebrands its modern role: Reduce complexity
The massive amount of data generated by digital technologies has pushed corporate IT into a power position at many enterprises. That has its pluses and minuses, according to panel of IT executives at the Argyle 2018 CIO Leadership Forum.

Dell EMC IT transformation central to 2018 channel strategy
The Dell EMC IT Transformation campaign, launched at the Global Partner Summit, looks to showcase the Dell Technologies portfolio and how partners can modernize IT infrastructure.

For Airbnb, data democratization is a strategic advantage
Despite a general recognition that data has business value, most companies have done little to democratize data. Then there is Airbnb data.

Embrace IT digital transformation and the new tech landscape
It’s time to face IT digital transformation or risk being left behind as IT and revenue become more closely linked together.

Competitive advantages of mobile apps for customers, employees
The advantages of mobile apps for customers include higher revenue, better ad targeting and customer outreach; for employees, it means more efficiency.

Trending Terms
Porter’s Five Forces
SWOT analysis
vertical market
strategic management
core competency
strategic innovation

Writing for Business
Digital transformation is tied to the broader trend of business transformation and takes ______ to take hold.
A. awhile
B. a while
Answer


May 4, 2018  6:24 PM

command and control server

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A command and control server (C&C server) is a computer that issues directives to digital devices that have been infected with rootkits or other types of malware, such as ransomware. Continued…

Quote of the Day

“To protect their malicious operations, hackers are constantly looking for techniques to try and obfuscate their C&C infrastructure and to avoid takedowns by making forensic analysis, detection and attribution a lot harder.” – Michael Cobb

Learning Center
AIR-Jumper: How can security camera lights transmit data?
Ben-Gurion University researchers developed aIR-Jumper — an exploit that leverages lights within security cameras. Learn how this targeted attack works.

How are hackers using Twitter as C&C servers for malware?
Hackers are using Twitter instead of C&C servers to spread their malicious Twitoor Android Trojan. Find out how the attack works and how to prevent it.

How can a malicious C&C server remain undetected?
A C&C server used by malware authors can evade detection, but here’s how enterprises can uncover malicious C&C communications.

New cloud threats as attackers embrace the power of cloud
Here’s a look at the top cloud threats in 2018 and some guidelines for protecting platforms and infrastructure in public clouds.

Katyusha Scanner: How does it work via a Telegram account?
The Katyusha Scanner is based on the Arachni scanner, and it now works through Telegram after being found on a hacking forum. Nick Lewis explains how this is possible.

Trending Terms
rootkit
ransomware
DDoS attack
botnet
white hat
Trojan horse

Writing for Business
A botnet is a group of computers organized to distribute spam or malware — _________ the owners are typically unaware of the fact.
A. though
B. although
c. even though
Answer


May 3, 2018  6:05 PM

Ultra Low Energy (ULE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Ultra Low Energy (ULE) is an extension of the Digital Enhanced Cordless Telecommunications (DECT) physical layer specification that supports low power devices. Continued…

Quote of the Day

“ULE technology is ideally suited to support the new wave of home IoT devices. It offers longer range, interference-free RF bandwidth, enhanced security, and natural support for two-way voice and video.” – Tali Chen

Learning Center
Four telecom infrastructure trends driving network of the future
Telecom infrastructure trends driving the network of the future include SDN, NFV, IoT and 5G, but they won’t be deployed without revenue-based reasons to adopt.

Internet of Things market could advance with telecom help
The Internet of Things market may have its best shot at success if telecom providers, with their communications and connections backgrounds, are in the mix.

5G wireless technology influences telecom’s future
Telecom’s future depends on 5G wireless technology to help converge wireless and wireline services and infrastructure.

Telecom vendors feel the pressure of operator transformation plans
Network operators’ focus on business and technology transformations is pressuring telecom vendors to sell pieces, not product suites, along with software.

Use IoT to eliminate the guessing game from your enterprise’s phone bill
To manage IoT devices, enterprises can now call upon their mobile service provider to offer an automated mobility management (AMM) software platform.

Trending Terms
DECT
system-on-a-chip
Z-Wave
star network
ZigBee
voice user interface

Writing for Business
A number of IoT gateway products ____ equipped with additional security features.
A. is
B. are
Answer


May 2, 2018  5:36 PM

composable infrastructure

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A composable infrastructure is a framework whose physical compute, storage and network fabric resources are treated as services. Continued…

Quote of the Day

“In a nutshell, programmable infrastructure is nothing more than using software and automation — rather than relying on manual processes — to manage, provision and configure infrastructure components.” – Chuck Moozakis

Learning Center
Is programmable infrastructure ready for prime time in networking?
Programmable infrastructure isn’t new, but the concept is finally gaining steam in networking, thanks to the advent of interoperable hardware and automation.

Understand the benefits, limits of composable infrastructure
With composable infrastructure, IT can evolve the virtualization and SDI technology already in its data centers for more efficient resource management.

Composable infrastructure creates new path to SDDC nirvana
Composable infrastructure and products that offer a cloud-like environment may offer a new route to the SDDC — but first, analyze your cloud strategy.

How does composable infrastructure fit in the data center?
Data center architecture could move from CI and HCI to composable infrastructure thanks to its flexibility, speed of modification and cost savings.

IT infrastructure automation boosts digital initiatives
Approaches to IT infrastructure automation like composable infrastructure automate IT, reducing the manual IT tasks that complicate digital business.

Trending Terms
network fabric
bare metal environment
software-defined networking
converged infrastructure
software-defined everything
software-defined data center

Writing for Business
The survey results taught us that one in three network administrators ____ interested in learning more about software-defined networking.
A. was
B. were
Answer


May 1, 2018  5:33 PM

integrated development environment (IDE)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An integrated development environment (IDE) is a software suite that consolidates the basic tools developers need to write and test software. Continued…

Quote of the Day

“Without IDE tools to visualize your code, the traditional way to analyze source code is to search for strings and then physically connect the dots.” – George Lawton

Learning Center
Build secure coding practices right into the IDE
Not every application is secure by design, which is why developers must be aware of secure coding guidelines and implement secure coding practices when they build software.

AWS appeals to the masses with low-code development project
An AWS low-code development platform in the works will enable nonprogrammers to create applications for the AWS cloud and fires a shot across Microsoft’s bow.

AWS Cloud9 IDE connects dispersed development teams
Developers can use the AWS Cloud9 IDE to work with each other within one console, eliminating geographic boundaries.

Learn about the top mobile app development platforms
Vendors that offer the top mobile app development platforms vary in what they can provide organizations. Here we focus on 12 prominent players in the MADP market.

Seven buying factors to compare mobile app dev platforms
When comparing mobile app dev platforms, buyers should examine what app types they support, as well as lifecycle management, integration and security features.

Trending Terms
interpreted script
GUI
versioning
cloud IDE
NetBeans
Eclipse
Visual Studio .NET

Writing for Business
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze
Answer


April 30, 2018  2:52 PM

evil maid attack

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

An evil maid attack is a security exploit that physically targets an unattended computing device. Continued…

Quote of the Day

“There are some things you could do to protect against evil maid attacks: use a strong password, set a password on the bios to prevent changes to the bios, only boot the system off of the hard drive and have some sort of tamper-evident alert if someone changes the hardware.” – Nick Lewis

Learning Center
Keycard vulnerability threatens millions of hotel rooms
A keycard vulnerability enabled researchers to create a master key to access every room in a targeted hotel, potentially putting millions of rooms at risk of a break-in.

Why security incident management is paramount for enterprises
The final component of achieving cybersecurity readiness is building a proper security incident management plan. Here’s how to do it.

Evil maid attacks: How can they be stopped?
An evil maid attack can bypass full disk encryption and expose sensitive corporate data. Here’s how to protect systems and data from evil maids.

How IoT security is different from physical and conventional IT security
There are a number of systematic differences that should make us view IoT security differently than physical security and even conventional IT security.

Data center physical security gets a tougher look
Data center physical security is increasingly a topic that is getting a closer look, with tough questions, from organizations seeking colocation space.

Trending Terms
industrial espionage
keylogger
full-disk encryption
physical security
insider threat

Writing for Business
An enterprise needs to have an overall plan to protect PII and secure _________ sensitive data.
A. their
B. its
Answer


April 27, 2018  12:05 AM

virtual private cloud (VPC)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A virtual private cloud (VPC) is the logical division of a service provider’s public cloud multi-tenant architecture to support private cloud computing in a public cloud environment. Continued…

Quote of the Day

“It isn’t enough for a virtual private cloud server provider to enable subscribers to create additional virtual private clouds. The infrastructure must also support the use of separate security domains.” – Brien Posey

Learning Center
Compare virtual private cloud server providers
When comparing virtual private cloud server providers, consider cost, the underlying platform, whether they offer dedicated hardware and data lines, and whether they support multiple subnets and VPCs with separate security domains.

Virtual private cloud vs. private cloud differences explained
The distinction between virtual private cloud vs. private cloud lies in where the data resides. A virtual private cloud is an allocated portion of the public cloud, whereas a private cloud is on premises.

Weigh virtual private cloud benefits for enterprise IT teams
Virtual private cloud benefits range from compliance to smoother migrations. Compare VPCs to on-premises private clouds to see if they’re right for you.

Hybrid cloud providers offer different architecture types
Hybrid cloud providers like Cisco/GCP and AWS — with VPC or VMware Cloud on AWS — can allocate a portion of the public cloud to be used as a private cloud or support an on-premises private cloud. Vendors like Microsoft allow customers to move the public cloud to the private cloud with Azure Stack.

Flow logs sharpen visibility into GCP network
VPC Flow Logs is a welcome addition to GCP, as it adds network visibility to monitor and respond to issues with security or performance on Google’s public cloud. Though Google has played catch-up here, it also leaps over the competition in some important ways.

Trending Terms
private cloud
public cloud
cloud cartography
logical network
virtual LAN
Amazon VPC

Writing for Business
Brokers must work closely with cloud providers, while also _________ their services to appeal to customers.
A. distinguishing
B. differentiating
Answer


April 26, 2018  11:07 PM

Google Chromium

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Google Chromium is an open source project that was initiated to make source code for the Chrome OS and the Chrome browser available to developers. Continued…

Quote of the Day

“Google draws its source code for Chrome from the Chromium project once it is happy with the stability and functionalities of features in production.” – Adrian Bridgwater

Learning Center
The Symantec-Google feud can’t be swept under the rug
The Symantec-Google feud regarding the antivirus vendor’s web certificate practices appears to be over. But that doesn’t mean it should be minimized or ignored.

Hijacked Chrome extensions infect millions of users
Eight hijacked Chrome extensions were used to infect more than four million users. Plus, Cloudflare ignites debate over freedom of speech, and more.

Google open sources Chromium browser bug tracker
Google has moved Monorail — the bug tracker used by the Chromium open source browser — to a newly open sourced status.

Google Chrome OS vs. Chromium OS: Understanding the difference
Google Chromebooks, the Chrome OS and Chromium OS all support HTML5 and new RDP clients. Learn the differences here.

Risk & Repeat: Google slams Symantec certificates
This Risk & Repeat podcast examines the dispute between Symantec and Google regarding claims of 30,000 mis-issued Symantec certificates over several years.

Trending Terms
open source
Chrome browser
Chrome Remote Desktop
source code
Chromebook
hotword

Your favorite Chrome extensions — can you help?
We want to know about your favorite Chrome extensions. What extensions do you find most useful for productivity, security, browsing, etc.?

Send the extensions you can’t live without to

editor@whatis.com

We’ll be sharing what we learn!


April 25, 2018  10:36 PM

Amazon Key

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Amazon Key is an in-home and in-car delivery service that allows authorized shippers to gain access to an Amazon Prime customer’s home, post office box or car trunk during specified times. Continued…

Quote of the Day

“The next level of the IoT-enabled smart home will be to first understand when something out of the ordinary is happening, and then autonomously solve the problem with corresponding responses.” – Haomiao Huang

Learning Center
The future of the IoT-enabled smart home
The IoT-enabled smart home of the future will use machine learning and artificial intelligence to run the dishwasher — and end domestic violence.

Internet of Things use cases that do more than lock doors
Not all Internet of Things use cases take full advantage of what robust networks can enable. The real benefits come from intelligence and automation.

Smart home biometric data: How domotics enable IoT data applications
Domotic data can be gleaned from smart home devices to benefit a number of applications, explains Raoul Wijgergangs of Z-Wave, Sigma Designs.

What security is needed for digital assistant devices?
Alexa for Business Platform and other digital assistant devices are set to transform business operations, but how will they affect cybersecurity?

Adapting multifamily housing for the IoT revolution
As IoT infiltrates everyday life, says IOTAS’ Sce Pike, multifamily housing developers need to put infrastructure in place to meet demands of modern renters.

Trending Terms
Amazon Prime
smart lock
smart home
endpoint authentication
home automation
Internet of Things

Writing for Business
A number of IoT gateway products ____ equipped with additional security features.
A. is
B. are
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: