“At first glance, a battle-hardened system administrator might dismiss a new configuration management tool as unnecessary. She can do the same thing with machine images and some shell scripts. This is equivalent to a lumberjack who has just heard about chainsaws and doesn’t see why anyone would ever want more than an ax.” — Andrew Shafer
Today’s WhatIs.com Word of the Day is Puppet, an open source IT automation tool that allows IT organizations to encode the configuration of services as a policy, which the framework then audits and enforces.
“Don’t recognize a lot of the names? The searches are almost 100% Dancing With The Stars-related searches… People have their priorities.” — Joe Weisenthal
Today’s WhatIs.com Word of the Day is Google Trends, a search tool that allows the user to see how often specific keywords, subjects and phrases have been queried over a specific period of time.
“In the hyperscale market they’re building their own systems and a single controller is good. It’s one less failure point. For these types of organizations, it costs more to send people out to change a drive than it does to just failover to another server. They want to rack-and-stack and if something breaks they fail the workload over. The server is the unit of failure. In the enterprise the drive or memory module is the unit of failure.” — David Flynn
Today’s WhatIs.com Word of the Day is hyperscale computing, a distributed computing environment in which the volume of data and the demand for certain types of workloads can increase exponentially, yet still be accommodated quickly in a cost-effective manner.
“The ability to remotely wipe any managed device is a staple of many enterprise mobile security policies, and it’s vital to preventing sensitive corporate data from being compromised.” — Lisa Phifer
Today’s WhatIs.com Word of the Day is enterprise wipe, a security feature offered by many mobile device management (MDM) products which selectively erases only those device settings, user data, applications, and application data that were previously installed by that MDM.
“There are two main types of buffer overflow attacks: stack based and heap based. Heap-based attacks flood the memory space reserved for a program, but the difficulty involved with performing such an attack makes them rare. Stack-based buffer overflows are by far the most common.” — Brien Posey
Today’s WhatIs.com Word of the Day is stack overflow, an undesirable condition in which a particular computer program tries to use more memory space than the call stack has available. In programming, the call stack is a buffer that stores requests that need to be handled.
“Users of Apple’s mobile devices are generally less likely to want to jailbreak their devices because they want to be able to update to the latest authorized OS version and take advantage of new features.” — John Girard
Today’s Whatis.com Word of the Day is jailbreaking, the removal of manufacturer or carrier restrictions from a device.
“A new generation of remote display protocols, including Microsoft RemoteFX, Citrix HDX and VMware PC over IP, is capable of providing a PC-like experience over the wire. Still, these protocols may run into trouble when delivering rich media to virtual desktops.” — Mike Laverick
Today’s WhatIs.com Word of the Day is remote display protocol, a special set of data transfer rules that makes it possible for a desktop hosted at one place to display on a client’s screen at another location.
Take a quiz and test your knowledge about remote display protocols!
“SQL may have taken a punch or two in 2012, but it refused to go down for the count. Companies specializing in the alternative NoSQL and Hadoop side of things brushed up their SQL credentials this year.” — Jack Vaughan
Today’s WhatIs.com Word of the Day is Hadoop, an open source framework that supports large data sets in a distributed computing environment.
As 2013 approaches, Jack says there’s a distinct possibility that big data may move from hot topic to practical reality. The reasons why? A big push behind data-driven decision making (intuition and common sense are out — data is in) and an improved understanding that NoSQL does not prohibit structured query language (SQL).
“DLP is just a tool; it just tells you where your areas of risks are,” he said. “The real win, in my opinion, is the opportunity it creates to bring awareness and training to your users.” — Charles Lee
Today’s WhatIs.com Word of the Day is data loss prevention. It’s describes a set of tools that will help monitor data transmissions and prevent end users from sending sensitive or critical information outside the corporate network.
“A common use case for VSAs is in small and medium-sized businesses (SMBs) where shared storage hasn’t been implemented. In these scenarios, virtual storage appliances consolidate direct-attached capacity on each physical host and create a virtual storage pool that looks like networked storage.” — Eric Slack