Word of the Day: Tech Definitions from WhatIs.com


February 28, 2018  5:15 PM

DNS redirection

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

DNS redirection was the controversial practice of serving a Web page to a user that is different from either the one requested or one that might reasonably be expected. Continued…

Quote of the Day

“DNS is a mission-critical service for enterprises, and it is also a gold mine of valuable data for protecting your enterprise.” – Nick Lewis

Learning Center
How did OurMine hackers use DNS poisoning to attack WikiLeaks?
A WikiLeaks attack was recently exposed by the hacking group OurMine. Nick Lewis shares how the hackers used DNS poisoning to take over the web address.

Use PowerShell for help with DNS server management
With assistance from PowerShell, the IT staff can save time by building scripts for DNS server management and modifications to DNS records.

DNS functions remain vital, but must adapt as demands shift
DNS functions remain vital. However, the proliferation of devices, especially those that are IPv6-only, present a challenge to this network protocol.

Hospital network security: Recursive DNS lookups yield threat insight
One health system uses recursive DNS lookups and deep insight into threat intelligence to ensure hospital network security.

Don’t let IPv6 and IoT question the purpose of DNS
DNS challenges, from IPv6 to the complexities of IoT, must be overcome, since a smooth-functioning domain name system remains essential for networking.

Trending Terms
cache poisoning
DNS attack
DNS Security Extensions
CNAME
MX record
404 status code

Writing for Business
Although ISPs promote DNS redirection as a service to customers, customers typically think the ISPs have _______ motives.
a. alterior
b. ulterior
Answer

February 27, 2018  4:05 PM

event-driven computing

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Event-driven computing is a computing model in which programs perform work in response to identifiable occurrences that have significance for system hardware or software. Continued…

Quote of the Day

“Users of event-driven computing services don’t need to think about provisioning and managing servers or application scalability in familiar, traditional ways to cloud users.” – Stephen J. Bigelow

Learning Center
How to evolve architecture with a reactive programming model
This article explains why and how the reactive programming model plays a key role in modernizing enterprise architecture.

IoT apps and event-driven computing reshape cloud services
Cloud providers have added new services to support IoT apps and event-driven computing. Explore the rise of these technologies and their impact on IT.

How application scalability works in event-driven vs. IaaS computing
Event-driven computing increases application scalability. Admins don’t have to provision resources, as serverless computing only implements code it needs on demand.

Working with event-driven compute resources
Event-driven compute platforms let businesses forgo the traditional model of app planning and management and rely on cloud resources on demand.

Event-driven applications drive next wave of IaaS evolution
Event-driven applications and web services have started to redefine the IaaS model, as major providers race to offer these more advanced features.

Trending Terms
machine-to-machine
event-driven architecture
ECA rule
serverless computing
event-driven application
AWS Lambda
If This Then That

Writing for Business
Serverless computing can significantly bring down costs since you’re not paying for servers 24/7, _________ of whether they are actively serving requests.
a. irregardless
b. regardless
Answer


February 26, 2018  5:02 PM

VM sprawl

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Virtualization sprawl is a phenomenon that occurs when the number of virtual machines (VMs) on a network reaches a point where the administrator can no longer manage them effectively. Continued…

Quote of the Day

“The great irony of virtualization sprawl is that it threatens the consolidation benefits that make virtualization attractive and cost-effective in the first place.” – Stephen J. Bigelow

Learning Center
Control VM sprawl with the right management tools
In this two-part series on how to control VM sprawl, we take a look at how implementing policies and right-size provisioning can prevent resource waste.

Benefits of VMs include workload mobility and fast duplication
Benefits of VMs include server consolidation, increased utilization and faster recovery times after failure, but there are some disadvantages as well.

Manage containers in cloud computing to prevent sprawl, cut costs
Containers in cloud computing have improved portability, but like VMs, they are susceptible to sprawl. Use these deployment tips to protect your budget.

The function and importance of server virtualization management tools
Server virtualization management tools help highly virtualized infrastructures by providing visibility into their VMs and physical hosts.

The best ways to control virtual machine sprawl
Find out how to reclaim a data center that’s overrun with virtual machine sprawl. While daunting, with a little organizing and the right tools, it’s doable.

Trending Terms
golden image
virtual machine lifecycle management
server sprawl
VMware template
server consolidation
zombie VM

Writing for Business
Application streaming and virtualization can help you _______ greater network efficiency.
a. attain
b. obtai
Answer


February 23, 2018  4:27 PM

lemmatization

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Lemmatization is the grouping together of different forms of the same word. Continued…

Quote of the Day

“NLP technology uses text and speech analytics to identify patterns in speech, a capability that can help businesses gain insight into how they can improve their products.” – Nicole Lewis

Learning Center
NLP technology inspires customer interaction projects in key verticals
NLP technology is starting to generate projects for IT service companies as businesses look to improve customer experience through chatbots and other apps.

Call center automation advances, but only as far as NLP can take it
Call center automation is changing customer service and enriching survey efforts, but strides forward hinge on natural language processing improvements.

AI in IT tools promises better, faster, stronger ops
Autonomous robots don’t lurk around every corner, but there is growing AI in IT operations, and it yields improved speed, accuracy, analysis and insight.

Natural language generation software making inroads in enterprises
Natural language generation software is gradually finding its way into enterprises as businesses look to deploy emerging artificial intelligence tools.

Natural language driving proliferation of FB Messenger
Natural language processing isn’t quite ready to pass the Turing test, but NLP bots using the technology are taking off.

Trending Terms
natural language understanding
search engine
HCI
natural language processing
stemming
AI

Writing for Business
Although some parts of the consumer industry are adept at using artificial intelligence apps practically and profitably, most businesses are slow to ________ and implement AI.
a. except
b. accept
Answer


February 22, 2018  4:08 PM

machine code

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Machine code, also known as machine language, is the elemental language of computers. Continued…

Quote of the Day

“Many applications are developed in programming languages that are not compiled to efficient machine code before deployment, but that are translated by an interpreter to machine code while the application runs.” – David Bicknell

Learning Center
Few own up to source code theft cybersecurity threats
Are you adequately protected against source code theft? Stealing trade secrets is often an inside job done by staffers about to change jobs.

Binary code scanners, like purchasing security vulnerability insurance
Learn why binary code scanners are critical to finding vulnerabilities in open source components and keeping the connected, IoT world safe.

Use APM tools to find app anomalies, wherever they occur
Applications built from hundreds of cloud services glued together with APIs benefit when developers use APM tools to root out hard-to-find bottlenecks.

Apple’s confidential iBoot source code leaked online
Apple’s iBoot source code was discovered on a public GitHub repository. The company has since ordered its removal, confirming the code’s legitimacy.

Obfuscation may prevent reverse engineering
Reverse engineering can reveal all of the source code in your .NET applications. Expert Dan Cornell recommends code obfuscation as a protective measure.

Trending Terms
reverse engineering
compiler
firmware
hexadecimal
programming language generations
source code

Writing for Business
Open source describes any software whose source codes in the public domain or that is copyrighted and distributed under an ______________.
a. open source license
b. open-source license
Answer


February 21, 2018  4:05 PM

validated learning

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Validated learning is an approach to demonstrating progress against business goals when traditional key performance indicators (KPIs) are not very useful. Continued…

Quote of the Day

“Instead of incorporating elaborate experiences for end users, it’s better to first enable basic IoT features and keep the system remotely upgradable for future enhancements.” – Sachin Kurlekar

Learning Center
Five ways IoT is transforming the manufacturing industry
Hitachi Vantara’s Greg Knieriemen offers five ways IoT will permanently change the manufacturing for the better, from improved operational efficiency to improving safety.

Social media key to future of learning and development
Signs are pointing to a future of learning and development that is collaborative, social and ongoing. Here’s what to know.

Comparing development methodologies: Agile vs. DevOps vs. Lean Startup
If comparing development methodologies is getting to be a bit much, expert Christopher Ward has the answer. Here’s his take on Agile, DevOps and Lean.

Learning culture critical to Agile success
A learning culture is critical to Agile software development success. It fosters innovation, focuses on problem solving and encourages team members to master new skills.

Agile principles, for IT and across the enterprise
Agile principles are pushing beyond the boundaries of IT and into the entire enterprise.

Trending Terms
startup
scientific method
build-measure-learn
metric
minimum viable product
product lifecycle
value stream mapping

Writing for Business
According to Mike Cohn, Agile planning ___________ change by recognizing that it will occur.
a. accommodates
b. accomodates
Answer


February 20, 2018  7:00 PM

Containers as a service (CaaS)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Containers as a service (CaaS) is a cloud service that allows software developers to upload, organize, run, scale, manage and stop containers by using a provider’s API calls or a web portal interface. Continued…

Quote of the Day

“Comparing virtualization to containers is a bit like comparing a tractor-trailer to a school bus. Both move things from place to place along a road, but each has specific uses through which it can drive the most value.” – David Linthicum

Learning Center
Container as a service providers compete with distinct strategies
Container as a service providers vie for users with the promise of smooth deployment and integrated tools, and, for customers, there is not always much choice.

Containerized applications and the portability dream
Containerized applications can make portability a more realistic scenario. But that doesn’t mean they are easy to deal with.

Comparing containers and VMs for multi-tenant apps
As people are getting enterprise-ready for Docker containers, it makes sense to compare the features of VMs versus containers for multi-tenant apps.

Manage containers in cloud with these four quick tips
Enterprises seek to solve their app portability issues with containers in cloud computing, but there’s no one-size-fits-all solution.

Words to go: Containers in cloud computing
Containers in cloud computing have become a commonly used technology for most enterprises. Study these key terms to expand your container knowledge.

Trending Terms
containerization
Infrastructure as a Service
Platform as a Service
Amazon EC2 Container Service
Google Kubernetes
Docker Swarm

Writing for Business
In Kubernetes, a replication controller scales containers horizontally, ensuring there are more or ________ containers to meet the overall application’s computing needs.
a. less
b. fewer
Answer


February 16, 2018  6:56 PM

FIDO (Fast ID Online)

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

FIDO (Fast ID Online) is a set of technology-agnostic security specifications for strong authentication. Continued…

Quote of the Day

“FIDO brings substantial gains to users and businesses, which explains its rapid adoption where other initiatives have failed to displace the password.” – Michael Cobb

Learning Center
FIDO authentication standard could signal the passing of passwords
Governments and industry are turning to the FIDO authentication standard for long-term solutions to the challenges of effective and secure authentication.

Advanced Protection Program: How has Google improved security?
The Google Advanced Protection Program enables individuals who are being targeted by malicious actors to add an additional layer of security to their accounts.

Password-free authentication: Figuring out FIDO
Will open FIDO standards for better interoperability of authentication technologies actually work? Here’s an update on the specifications as the first products ship.

What the FIDO specification means for multi-factor authentication
Enterprises and security pros should stay up to speed on the FIDO specification as a new authentication standard for many reasons, including freedom from passwords and greater security.

How to deal with identity and access management systems
Learn how an identity and access management system can help secure the enterprise even in this age of complex technological advances.

Trending Terms
strong authentication
multifactor authentication
public key
PII
biometric authentication
one-time password
strong password

Writing for Business
The credit union website uses two-factor authentication to protect _____ members.
a. their
b. its
Answer


February 15, 2018  9:27 PM

rugged DevOps

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Rugged DevOps is an approach to software development that places a priority on making sure code is secure before it gets to production. Continued…

Quote of the Day

“It’s possible to develop code that’s even more secure than before the move to DevOps if you approach DevOps and security properly.” – Johna Till Johnson

Learning Center
Salary snapshot: It’s a very good time to be a DevOps pro
Job postings — and salaries — for DevOps have never been higher. Employment trends expert Will Markow explains why now is the time to be a DevOps pro.

Totally automatic: Improve DevOps and security in three key steps
Combining DevOps and security is possible; learn three key steps in this article by Nemertes Research CEO Johna Till Johnson.

Use a rugged DevOps approach to boost cloud app security
When implementing DevOps, many organizations make security an afterthought. But an approach known as rugged DevOps can secure cloud apps throughout the entire development lifecycle.

Why your DevOps process should have security baked in
The DevOps process helps organizations develop new cloud applications more quickly and efficiently. But without an end-to-end security strategy, those apps could be at risk.

Incorporating security is the next step in the evolution of DevOps
The evolution of DevOps has led to security being incorporated into the product development process. Will DevSecOps live up to its promise?

Trending Terms
DevOps
IT operations
lean software development
Agile Manifesto
continuous software development
penetration testing

Writing for Business
Successfully _______ a DevOps culture in a data center isn’t easy, but it brings great rewards.
a. adapting
b. adopting
Answer


February 14, 2018  9:21 PM

buffer overflow

Kaitlin Herbert Kaitlin Herbert Profile: Kaitlin Herbert

Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. Continued…

Quote of the Day

“A buffer overflow can be thought of as data that goes outside the bounds of a block of allocated memory to corrupt data, crash the program or allow the execution of malicious code.” – Daniel Allen

Learning Center
How did a Microsoft Equation Editor flaw put systems at risk?
A Microsoft Equation Editor vulnerability put systems at risk of compromise. Learn how the flaw worked and how enterprises can protect themselves.

How climate change threats can inform cybersecurity strategies
There are several parallels between climate-related threats to critical infrastructure and data risk. Can the connection help companies develop effective cybersecurity strategies?

How can attacks bypass ASLR protection on Intel chips?
Attackers can bypass ASLR protection and conduct local attacks on any platform due to an Intel chip flaw. Find out how to protect your enterprise.

Broadpwn flaw: How does the new iOS exploit compare?
A researcher at Google’s Project Zero developed an iOS exploit that mimics Broadpwn. Expert Kevin Beaver explains how it works.

How do code-reuse attacks bypass Windows 10 security features?
Code-reuse attacks use counterfeit object-oriented programming to bypass Windows 10 security features. Here’s a look at how that works and how to stop it.

Trending Terms
buffer
attack vector
Common Weakness Enumeration
integer overflow
Unicode
address space layout randomization
stack overflow

Writing for Business
It only takes one user ________ security policies to give an attacker access to network data.
a. flouting
b. flaunting
Answer


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: