The WhatIs.com Word of the Day is cloud backup.
|“Technically, archiving applications used for compliance should apply policies to files, move files based on those policies and keep audit information on files. Also, the file content should be indexed to make it searchable and be written to specific media depending on regulatory specifics.”
Shane O’Neill, Choosing a compliance archiving tool
Today’s WhatIs.com Word of the Day is data archiving.
|On the surface, Appreciative Inquiry can sound too “touchy feely” for hard-nosed business people. We like to vent and to gripe. But is venting the best use of time at an organization’s planning meeting?
Jane Logan Appreciative Inquiry
Today’s WhatIs.com Word of the Day is Appreciative Inquiry.
|Near CDP is a marketing invention of people who don’t offer continuous data protection but are trying to repackage non-continuous technologies as ‘kind of being the same thing.’
Mark Twomey, Non-CDP
Today’s WhatIs.com Word of the Day is near-continuous data protection.
|Up until now, hot desking has been hard to sell — especially in the banks. But now it is pretty attractive compared to a cold desk in the street.
David Crosbie, Sell your CIO on helpful technologies
Today’s WhatIs.com Word of the Day is hot desking.
|Chrome OS is only shipping on specific hardware from manufacturers Google has partnered with. That means if you want Chrome OS, you’ll have to purchase a Chrome OS device.
Sundar Pichai, Google OS: the end of the hard drive?
Today’s WhatIs.com Word of the Day is Google Chrome OS.
|Even the most widely used protocol on the Internet — namely, HTTP — may be described as both chatty (involving frequent communications) and bursty (involving numerous periods during which tens to hundreds of resource requests may be in flight on the network at any given moment).
Ed Tittel, WAN optimization techniques
Today’s WhatIs.com Word of the Day is chatty protocol.
Today’s WhatIs.com Word of the Day is WAN accelerator.
|We describe this type of attack as “active” rather than “passive” because of two essential differences in the nature of the attack:
• It is initiated by the attacker rather than the victim
• The target is entirely controlled by the attacker, rather than being limited by the extent of the victim’s browsing activity
Roi Saltzman and Adi Sharabani, Active Man in the Middle Attacks whitepaper
|CoCo consists of 92 detailed security questions, some of which deal with endpoint protection and encryption…”Some questions had to be answered by people with a mix of skills — the network guys, the server team, the installation guys. To be honest, we found it difficult to complete. I must have sent it back about five or six times to the project manager at Government Connect before we actually got accredited.”
Vernon Coles, as quoted in USB drive security project protects endpoints, aids CoCo compliance
Today’s WhatIs.com Word of the Day is Code of Connection (CoCo)