|“For many years, open source was seen as a trailing effort to proprietary projects. In the big data/NoSQL space, this has been turned on its head. Cassandra is a really good example of how openness is leading the development of next-generation infrastructure technology.” — Joe Brockmeier|
Today’s WhatIs.com Word of the Day is Cassandra, a highly-scalable NoSQL open source database system that was created for Facebook but has since become a top-level project over at the Apache Software Foundation. Cassandra’s claim to fame? She can handle hundreds of thousands of requests per second. According to Apache, the largest Cassandra production cluster as of this writing exceeds 300 terabytes of data over 400 machines.
|“Coaxial cables use a single copper conductor at the center, insulated by a plastic layer and a braided metal shield, which blocks interference. Coaxial cables are hard to install, but can support greater cable lengths than twisted pair.” — Carrie Higbie|
Today’s WhatIs.com Word of the Day is conductor. Conductivity, in general, is the capacity to transmit something, such as electricity or heat.
An electrical conductor is a substance in which electrical charge carriers, usually electrons, move easily from atom to atom with the application of voltage. A substance that does not conduct electricity is called an insulator or dielectric material.
|“Built on mostly open source software and commodity hardware, Digg dropped its open source MySQL database in favor of Cassandra, a non-relational, “NoSQL” database that was developed by Facebook and handed over to the Apache Software Foundation.” — Rob Barry|
Today’s WhatIs.com Word of the Day is Digg, a social news site that allows members to raise the visibility of stories they like best and bury stories they don’t like. Digg was launched back in 2004.
|“Too many companies rely on the computer-based security training courses that each employee must complete once a year to meet compliance requirements.” — Bob Rudis|
Today’s Whatis.com Word of the Day is security awareness training, a formal process for educating employees about corporate policies and procedures for working with information technology (IT).
With all the pressures a busy security manager has to deal with, documenting end user security awareness is often low on the list. That’s why computer-based training (CBT) is so popular.
Unfortunately, CBT can be boring. It’s SO boring, in fact, that in education it’s often referred to as “drill and kill.”
At last, it seems as if security end user awareness trainers are taking a look at how elementary school educators keep drills interesting — they turn them into games and personalize them.
For instance, if you were an elementary teacher and had to get your students through a daunting amount of word problems to prepare students for standardized testing, you might substitute the names the textbook uses in the word problems for that of your own students and insert students photos or drawing next to the problem.
Or you might turn a drill into a game of Pictionary or Jeopardy or Wheel of Fortune. The bottom line is that anything you can do to make learning fun is as important for adult learners as it is for young ones.
|“Recruiters aren’t yet specifically looking for candidates who are certified in BPM. In fact, of 67 BPM job descriptions the Gartner researchers examined, not one included a requirement for BPM certification. Instead, most were seeking hard skills such as Business Process Modeling Notation (BPMN) and Six Sigma, and soft skills such as change management.” — Anne Stuart|
Today’s WhatIs.com Word of the Day is business process professional. The Association of Business Process Management Professionals is offering a new certification for business process pros which is renewable every three years.
|“There are techniques that can determine the context of access — the type of device, where it’s accessing from, who the user is, [whether it’s] legitimate access to this data or application — and use those techniques to begin to build a policy around what is and what is not appropriate for these devices, which are usually not managed, period.” — Scott Crawford|
Today’s WhatIs.com Word of the Day is context-aware network access control (CANAC), an approach to managing the security by granting access to network resources according to contextual-based security policies. The endpoint device is granted access, quarantined or blocked from the network depending on the device’s type, location, identity and the operating system or applications running on it.
|If you ask different people in the data center world what ‘infrastructure’ means, you will get diverse answers. The same holds true for the current crop of DCIM offerings by various vendors. — Julius Neudorfer|
Today’s WhatIs.com Word of the Day is data center infrastructure management (DCIM), the convergence of IT and data center facilities functions within an organization. When properly implemented, DCIM can provide a holistic view of the facility and facilitate energy conservation to reduce data center operating expenses.
|“After years of talk and previews and betas, Microsoft finally released its RemoteFX enhancements for Remote Desktop Protocol… So, Windows 7 only, Windows running in a VM only, Hyper-V only, LAN only and expensive, large, power-hungry graphics cards. Does RemoteFX sound like something you want to use today?” — Brian Madden|
Today’s WhatIs.com Word of the Day is RemoteFX, a set of protocols for Microsoft’s Remote Desktop Protocol (RDP). A virtual desktop delivered through RemoteFX allows the end user to work remotely in a Windows Aero desktop environment, watch videos and run 3-D applications with performance that is close to a native desktop experience.
|“Arc flash has become such a major concern that legally much of the electrical distribution equipment in a data center should now carry “Arc Flash Hazard” labels. For data center operators, this means you may be told to shut down power when maintenance is required or when a new circuit needs to be installed.” — Robert McFarlane|
|“While predictive analytics helps you model and forecast what might happen in the future, prescriptive analytics helps you decide the best course of action to take given your objectives, requirements and constraints.” — Brett Stupakevich|