Word of the Day: Tech Definitions from WhatIs.com


October 24, 2018  8:22 PM

IT monitoring

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

IT monitoring is the process to gather metrics about the operations of an IT environment’s hardware and software to ensure everything functions as expected to support applications and services. Continued…

Quote of the Day

“An IT monitoring strategy depends on the applications and systems it governs. Static and dynamic thresholds each have benefits and drawbacks, but it’s possible to find a balance.” – Alastair Cooke

Learning Center
IT pros shore up Prometheus monitoring via third-party tools
Prometheus monitoring for Kubernetes lacks key security and reliability features in its raw upstream version, so enterprises turn to third-party integrations from Sysdig, Rancher Labs and Red Hat to bridge the gaps.

Monitoring thresholds determine IT performance alerts
Monitoring thresholds set a performance bar for applications and systems, but those bars can be as tricky as they are helpful. Manual systems tuning is tiresome, but dynamic tools can misread errors as status quo.

How the Nagios monitoring tool tracks IT environment details
With a little help from agents and plug-ins, the Nagios monitoring tool makes both active and passive checks on important operating specs about servers, applications and various services.

Automated root cause analysis moves into the mainstream
Automated root cause analysis has been hyped for more than a year, but DevOps monitoring tools that offer troubleshooting guidance and even predictive analytics are finally in production within mainstream enterprises.

IT monitoring strategy, org discipline polish Nasdaq DevOps incident response
Shared tools in Nasdaq’s IT monitoring strategy were only half the battle to improve DevOps incident response; the rest was organizational discipline.

Trending Terms
agentless
real-time monitoring
app monitoring
log management
Nagios
Zenoss
dynamic and static

Quiz Yourself
Business activity monitoring provides an immediate real-time monitoring and ____________ capability.
a. decisioning
b. decision-making
Answer

October 23, 2018  4:56 PM

gig economy

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A gig economy is a free market system in which temporary positions are common and organizations contract with independent workers for short-term engagements. Continued…

Quote of the Day

“In addition to strong collaboration between technology teams and business units, the gig economy will factor heavily into the future of IT jobs.” – Mary K. Pratt

Learning Center
Tips to build a successful digital customer service strategy
Learn how to create a successful digital customer service and support strategy with insights from Wendy’s, Chamberlain Group and DoorDash on how they integrated Salesforce AI and added social media channels.

Embedded IT, global talent to define future of IT jobs
What’s the future of IT jobs in the enterprise? Corporate IT departments aren’t likely to disappear anytime soon, experts said, but much about them will change, including how people will work and where talent is sourced.

Top five markets disrupted by sharing economy apps
Sharing economy apps can thrive and disrupt incumbent industries. Explore the five top markets that could become the next frontier of digital disruption.

New tech trends in HR: Josh Bersin predicts employee experience ‘war’
Noted HR analyst Josh Bersin, formerly of Bersin by Deloitte, outlined new tech trends in HR at the 2018 HR Technology Conference, which runs from Sept. 11 to 14. Bersin spoke on AI and employee experience and predicted a ‘war’ for which system employees use first.

Eight human capital management functions every HR department needs
Learn the eight must-have human capital management functions that every successful HR department needs in the age of contingent labor, employee engagement, people analytics and AI.

Trending Terms
millennial generation
job hopper
work-life balance
sharing economy
gift economy
barter economy

Quiz Yourself
The CEO sighed and shook her head. “Your whole department only brought in three new accounts last month. I need you guys to be __________.”
a. rainmakers
b. purple squirrels
Answer


October 22, 2018  4:54 PM

DNA storage

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

DNA storage is the process of encoding and decoding binary data onto and from synthesized strands of DNA (deoxyribonucleic acid). Continued…

Quote of the Day

“Despite the challenges that come with DNA-based data storage, the technology shows enough promise for scientists to continue to look for practical solutions.” – Robert Sheldon

Learning Center
DNA data storage developments demonstrate serious potential
DNA data storage may sound like something out of a science fiction novel, but it is nonetheless becoming a rising possibility for the future of data storage media. See what developments have occurred and where the technology could still use some improvements.

Could DNA storage be the future of data storage technology?
The scope of data storage technology is moving well beyond the realm of magnetics and solid-state electronics and into the world of biology, particularly DNA storage.

Another Breakthrough in Microsoft DNA Storage
Microsoft is trying to take the lead in commercial DNA storage with the goal of having a Microsoft DNA storage appliance by the end of the decade.

Molecular memory could boost HDD density
New molecular memory promises to boost density, save drive size and add a third bit state for hard disks. Increased storage density is becoming more important as the amount of data continues to grow.

Atomic storage offers speed and capacity, lacks intelligence
Though atomic storage could make it possible to store terabytes of data on single atoms, the process has to occur at minus 300 degrees Celsius, making its promise far from reality.

Trending Terms
encoding and decoding
primary storage
genomics
biorobotics
wetware

Quiz Yourself
Bringing in all-flash for primary storage adds a faster system that can provide greater __________ value for the company.
a. economical
b. economic
Answer


October 19, 2018  4:52 PM

robotics quotient

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Robotics quotient (RQ) is a way of scoring a company or individual’s ability to work effectively with robots, just as intelligence quotient (IQ) tests provide a score that helps gauge human cognitive abilities. Continued…

Quote of the Day

“Robotics quotient enables CIOs to identify gaps or areas where you need to prioritize resources before you make a big bet on automation and AI.” – J.P. Gownder

Learning Center
Success with automation and AI requires a high ‘RQ’
CIOs who want to succeed with deploying automation and AI in the enterprise need to develop their robotics quotient if they want to be successful.

IoT and robotics, evolving together
Though still in early adoption stages, IoT and robotics work hand in steel hand. Read on to learn the benefits of adding smarts to robotics for automation.

Forget Hollywood’s AI promises, results are what inspires next-gen tech pros
A new generation of workers flocked to HubWeek 2018 to hear panelists tackle the stigma of AI in the workplace. Their tip? Lose the glamour and focus on the scope of technology.

New deep learning algorithms could improve robot sight
The world is filled with unpredictable events. Self-driving cars and other real-world robot navigators are not very good at dealing with that kind of complexity. Carnegie Mellon’s David Held is developing deep learning algorithms to do something about that.

Robotic process automation can speed payer claims processing
Robotic process automation can make claims processing more efficient for health insurance payers and providers by minimizing the human labor factor.

Trending Terms
robotic process automation
AI
probabilistic robotics
industrial automation
robot economy
smart machines

Quiz Yourself
Before I invest time and money in a certification for mechatronics, I want to seek ______ from someone at the Robotic Industries Association (RIA).
a. counsel
b. council
Answer


October 18, 2018  4:49 PM

3Vs (volume, variety and velocity)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

3Vs (volume, variety and velocity) are three defining properties or dimensions of big data. Continued…

Quote of the Day

“Industry experts typically classify big data using the 3Vs model: volume, variety and velocity. This categorization holds up whether your business handles enterprise applications with large data sets or whether it’s a consumer-facing startup with tens of thousands of users for your social app.” – Twain Taylor

Learning Center
3 ways to prep microservices applications for big data
Big data management is a complex task, especially with distributed microservices applications. But by thinking carefully about database structuring and management, application management teams can get a handle on that task.

Beat the challenges of predictive analytics in big data systems
Doing predictive analytics in big data environments creates a unique set of challenges, but also presents opportunities to those who are ready to handle them.

Big data trends: What enterprise architects need to prepare for
Progress Software’s Jesse Davis says now that the notorious 3Vs have been tended to, big data trends include moving toward inquiry, insight and innovation.

Big data analytics: New patterns emerge for security
Will big data and predictive analytics really make security better? With data scientists in short supply, solution providers work on big data analytics tools for enterprise users.

Cloud-based applications must deal with quirks of big data
Developers need to add veracity to volume, velocity and variety (the 3Vs of big data) when creating cloud-based applications. All four factors are crucial for business agility.

Trending Terms
big data management
big data analytics
small data
IoT analytics
enterprise data hub
SnapLogic

Quiz Yourself
Information extraction is a process intended to pull meaningful data from noisy text without making _________ changes in the author`s intended meaning.
a. substantial
b. substantive
Answer


October 17, 2018  4:46 PM

COPE (corporate-owned, personally-enabled)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

COPE (corporate-owned, personally-enabled) is a business model in which an organization provides its employees with mobile computing devices and allows the employees to use them as if they were personally-owned notebook computers, tablets or smartphones. Continued…

Quote of the Day

“Despite the challenges associated with the COPE model, some organizations might greatly benefit from the control it returns to their IT departments, especially when it comes to protecting sensitive data.” – Robert Sheldon

Learning Center
How to sharpen a corporate mobile device strategy
A strong corporate mobile device strategy should take cost and security factors into consideration. Check out these best practices to ensure that employees use mobile devices effectively in an organization.

COPE devices bring big benefits to IT
Organizations that provide COPE devices to users don’t have to manage them any differently than BYOD. Learn more about the benefits of this ownership model.

Enterprise mobility: What to expect in 2018
MOBI’s Josh Garrett discusses trends for enterprise mobility in 2018, explaining why Microsoft will be relevant in mobility and why exclusive BYOD is out.

BYOD or COPE: Which enterprise mobility strategy is right for you?
Learn about the pros and cons of the BYOD and COPE models so you can make an informed decision about which enterprise mobility strategy to implement in your organization.

Compare these top EMM providers and their potential impact
The most prominent EMM providers all possess their own strengths and shortcomings. Learn which vendor would best support your system.

Trending Terms
mobile device management
mobile application management
bring your own device
dual persona
choose your own device
enterprise mobility

Quiz Yourself
BYOD policies often illustrate a significant ________ between administrators and employees.
a. disconnect
b. disconnection
Answer


October 16, 2018  4:43 PM

talent pipeline

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

A talent pipeline is a group of job candidates who are able to immediately step in and fill an open position. Continued…

Quote of the Day

“Because jobs are changing so fast, you’re going to need talent with core skills and agility to pick up and go from one department and function to another.” – Jeanne Meister

Learning Center
At its Talent Connect, LinkedIn unveils ATS and broad strategy
LinkedIn announced at its Talent Connect conference an applicant tracking system that aims at small and midsize businesses. Meanwhile, for enterprise users, LinkedIn will work further on integrations, including with Oracle’s HCM cloud systems.

How HR can improve the candidate experience in recruitment
The candidate experience in recruitment is an HR trend that has larger implications for the company. Here’s what it is and how to improve it.

Foot Locker improves its candidate experience and hiring
Foot Locker, a major retailer, has adopted a new talent management system with the goal of improving its candidate experience, as well as automating some functions. It’s also using personality assessments.

Heading into 2018, HR tech market remains hot and competitive
HR tech market investments in applicant tracking systems are expected to rise in 2018 and recruiting tech to be in demand. Midmarket offers room for growth.

Talent assessment tool helps restaurants save in hiring and training
The operator of O’Charley’s and Ninety Nine Restaurant & Pub screens job applicants with the OutMatch talent assessment tool to predict the best hires.

Trending Terms
candidate relationship management
recruitment management system
candidate experience
applicant tracking system
HR technology
digital HR

Quiz Yourself
The successful candidate will have a ___________ in Communications.
a. master’s degree
b. masters degree
Answer


October 15, 2018  4:40 PM

PACS

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

PACS (picture archiving and communication system) is a medical imaging technology used primarily in healthcare organizations to securely store and digitally transmit electronic images and clinically-relevant reports. Continued…

Quote of the Day

“With a PACS, a healthcare provider can access patient information or medical images essentially from anywhere in the world and review the most up-to-date scans and reports almost instantly.” – Megan Charles

Learning Center
How hospitals are using the cloud for medical image storage
As the amount of medical imaging data continues to grow, many healthcare organizations are turning to the cloud for their medical image storage needs.

The current state of PACS software and where it goes from here
Many healthcare organizations are still using PACS software for their medical imaging needs. However, the technology is changing due in no small part to the introduction of the cloud as a backup or replacement for on-premises systems.

HPE 3PAR StoreServ all-flash fixes hospital’s image problems
An Illinois health provider won an HPE 3PAR StoreServ 8450 all-flash array as part of a vendor-sponsored contest. The all-flash storage provides a flash cache to load radiology images faster.

A look at the leading medical imaging software on the market
Learn about the leading medical imaging software and how these products help blend old and new tech to promote collaborative healthcare environments.

What makes up a medical imaging system?
Learn about the technology that makes up a medical imaging system and see how it all helps healthcare organizations create, store and share medical images.

Trending Terms
DICOM
electronic health record
radiology information system
vendor neutral archive
personal health record
telepathology

Quiz Yourself
Risk analysis is a _________ component of the HIPAA Security Rule because it allows an entity to target its main security loopholes and deficiencies.
A. incisive
B. decisive
Answer


October 12, 2018  4:33 PM

12 factor app (twelve-factor app)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Twelve-factor app is a methodology for building distributed applications that run in the cloud and are delivered as a service. Continued…

Quote of the Day

“Any developer building cloud-based applications, most of which run as a service, should familiar with the 12 factors.” – Michael Maximilien

Learning Center
CI/CD workflows, IT roles lead to organizational disharmony
Disparate CI/CD workflows within an organization can make it more difficult to build development stages into a DevOps pipeline, but the biggest barriers to progress are culture challenges, not technological ones.

Developing cloud applications must play by the rules — all 12 of them
Scalability isn’t enough when developing cloud applications. They need to be self-healing, self-restarting and able to recover their last state.

Manage app dependencies carefully for serverless platforms
Challenges with app dependencies on serverless platforms relate to native modules, deployment packages and more. Overcome them with these tips.

Cloud Foundry users grapple with stateful cloud-native apps
Stateful cloud-native apps remain a contradiction in terms, but Cloud Foundry PaaS users envision a future where persistent data services come into the 12-factor fold.

Container backup follows data persistence to these ephemeral apps
Following the addition of data persistence, container backup is the latest enhancement to these ephemeral applications. Container application data must be protected like all other enterprise data.

Trending Terms
native cloud application
microservices
continuous delivery
application platform
continuous integration

Quiz Yourself
Treating testing as a ________ rather than something that should be done continuously throughout software development is a recipe for defective software.
A. phase
B. faze
Answer


October 11, 2018  4:37 PM

confidentiality, integrity, and availability (CIA triad)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Continued…

Quote of the Day

“Device security should be incorporated into any design, and IoT deployments are not exempt. The general approach is to use the CIA triad: ensure the confidentiality, integrity and availability of the technology.” – Rick Vanover

Learning Center
What tactics can organizations adopt to drive cloud security practices?
In this SearchCIO Ask the Expert, Gartner research director Marco Meinardi highlights cloud security practices that CIOs can implement for effective use of public cloud services.

Now and later with IoT: What to consider regarding cost, reliability and security
While the benefits of IoT are becoming clear for many organizations, considering cost, reliability and security prior to deployment are critical. Veeam’s Rick Vanover discusses.

CISO: Data integrity and confidentiality are ‘pillars’ of cybersecurity
In this Q&A, learn how one cybersecurity industry veteran maintains what she said are the basic, fundamental aspects of information protection: ensuring data integrity and confidentiality.

Get smart with cloud backup security through ‘CIA’
IT will often wonder if backup data is safe in the cloud. Ensure cloud backup security with data confidentiality, integrity and availability.

Gartner Catalyst 2018: A future without data centers?
Advancements in cloud computing has allowed some organizations to move toward shutting down entire data centers. At the Gartner Catalyst 2018 conference in San Diego, Gartner research vice president Douglas Toombs discussed ways to determine which applications are cloud-ready.

Trending Terms
social engineering
counterintelligence
IoT privacy
IoT security
infosec
CISSP

Quiz Yourself
Today’s CISO needs interpersonal skills in order to _________ others in the boardroom to support their cybersecurity vision.
A. convince
B. persuade
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: