## Glosario KW | KW Glossary

### Ontology Design | Diseño de Ontologías

Navegue por el glosario usando este índice.

Especial | A | B | C | D | E | F | G | H | I | J | K | L | M | N | Ñ | O | P | Q | R | S | T | U | V | W | X | Y | Z | TODAS

Página:  1  2  (Siguiente)
TODAS

### S

 S

#### S (OPEN SOURCE)

• Samba - Samba is a popular freeware program that allows end users to access...
• Secure Shell Charter - The Secure Shell Charter (SSH Charter...
• Secure Shell Charter (SSH Charter) - The Secur...
• shared source - Shared source is a software licensing concept that ...
• Slackware - Slackware is the earliest distribution of the Linux operati...
• Slashdot - Slashdot is a socially curated website dedicated to technolog...
• smbclient - Samba is a popular freeware program that allows end users t...
• Snort - Snort is an open source network intrusion detection system (NIDS) c...
• SnortSnarf - SnortSnarf is a program that was designed for use with Sn...
• social computing - Social computing is the collaborative and int...
• software package - A software package is an assemblage of files ...
• source code - Source code and object code refer to the "before" and "...
• Squid proxy server - Squid is a Unix-based proxy server that c...
• SSH Charter - The Secure Shell Charter (SSH Charter) is a set of pape...
• Subversion - Subversion is a version control system that keeps track o...
• Sugar - Sugar is a graphical user interface GUI developed for the 100 lapt... • SuSE - SuSE (pronounced soo'-sah) is a German Linux distribution provider an... #### S (PMI) • Schedules in project management consists of a list of a project's terminal elements with intended start and finish dates. • Scientific management is a theory of management that analyzes and synthesizes workflow processes, improving labor productivity. • Scope of a project in project management is the sum total of all of its products and their requirements or features. • Scope creep refers to uncontrolled changes in a project's scope. This phenomenon can occur when the scope of a project is not properly defined, documented, or controlled. It is generally considered a negative occurrence that is to be avoided. • Scrum is an iterative incremental process of software development commonly used with agile software development. Despite the fact that "Scrum" is not an acronym, some companies implementing the process have been known to adhere to an all capital letter expression of the word, i.e. SCRUM. • Six Sigma is a business management strategy, originally developed by Motorola, that today enjoys widespread application in many sectors of industry. • Software engineering is the application of a systematic, disciplined, quantifiable approach to the development, operation, and maintenance of software. • Systems Development Life Cycle (SDLC) is any logical process used by a systems analyst to develop an information system, including requirements, validation, training, and user ownership. An SDLC should result in a high quality system that meets or exceeds customer expectations, within time and cost estimates, works effectively and efficiently in the current and planned Information Technology infrastructure, and is cheap to maintain and cost-effective to enhance. • Systems engineering is an interdisciplinary field of engineering that focuses on how complex engineering projects should be designed and managed. ----------------------------------------- • Salida: Se refiere a un producto, efecto, consecuencia, resultado o servicio creado por un proceso. Incluso únicamente puede tratarse de un dato Puede ser un dato primario que lleve a proceso posterior. • Secuencia: Es el orden en el cual las actividades ocurrirán con respecto a otra. Permite establecer la prioridad y dependencias entre las actividades. Las relaciones entre la actividad sucesora y la predecesora se desarrollan en un formato de red, permitiendo a las personas involucradas en el proyecto una mejor visualización del flujo de trabajo. • Seguimiento: Es el proceso de supervisión continua de una actividad, con el propósito de garantizar que las actividades se desarrollen con efectividad de acuerdo al plan trazado inicialmente. • Simulación: Consiste en simular o aparentar la realización de un proyecto a través de un modelo que traslada las dudas e inseguridades especificadas de forma detallada a su impacto en los probables objetivos del proyecto. Estos simulacros generalmente se fundamentan en modelos informáticos y de estimaciones de riesgos. • Síndrome del estudiante: Los tipos de estudiante que dejan las cosas hasta último moneto son propensos a enfrentar alguna evaluación con muy escasa preparación previa, generalmente hacen una revisión final hasta el último minuto sin importar cuanto tiempo tuvieron para prepararse. Lo mismo puede suceder en los proyectos con algunos miembros del equipo que aprovechando el tiempo del que disponen para una actividad deciden hacerla casi hasta el final cuando se acerca el momento de su revisón, por lo que generalmente la labor realizada tiende a ser deficiente. • Sistema de información de la gerencia de proyecto (PMIS): Conjunto de herramientas y las técnicas usadas para recolectar, integrar, y diseminar (difundir) los productos de los procesos de la gerencia de proyecto. Se utiliza para apoyar todos los aspectos del proyecto desde el inicio hasta el cierre. y puede incluir ambos sistemas, manual y automatizado. • Six Sigma: Se trata de una filosofía de gestión desarrollada por Motorola que enfatiza la imposición de objetivos extremadamente alto, recolectando datos y analizando resultados hasta un nivel fine muy exacto como forma de reducir defectos en productos y servicios. • Slack: Término usado en PERT para flotación. • Sociedad: Es el acuerdo que suscriben una o más compañías para trabajar de manera conjunta y asumir un único proyecto que le genere beneficio a todas las partes involucradas. Soft crashing: Tipo de crashing que se realiza dedicando horas extras del quipo de trabajo al proyecto, con el fin de reducir su duración total. • Software de Administración de Proyectos: Son las aplicaciones informáticas destinadas y diseñadas para auxiliar a la administración de proyectos, en la planeación, control etc., de un proyecto. • Solicitud de Cotización (RFQ): Generalmente, este término es equivalente a solicitud de propuesta, sin embargo, en algunas áreas de aplicación puede tener un significado más estrecho o específico. • Solución Temporal: Esta es una respuesta ante un riesgo negativo que se ha producido durante el desarrollo de alguna de las tareas del proyecto. Está fuera del plan de contingencias puesto que no existe una solución alternativa planificada de antemano para hacer fente al evento de riesgo que se presentó. También se le llama solución alternativa. • Stakeholder: Término utilizado por primera vez por R. E. Freeman, para referirse a quienes pueden afectar o son afectados por las actividades de una empresa. Estos grupos o individuos son los interesados ("stakeholders"), que según Freeman deben ser considerados como un elemento esencial en la planeación estratégica de negocios. • Subproyecto: Es una parte más reducida del proyecto general, la cual se genera al fragmentar un proyecto en componentes más fáciles de administrar. • Supuestos: Son elementos que para las intenciones de planificación se toman como verdaderos, sin necesidad de que exista una prueba o demostración. #### S (PROGRAMMING) #### S (STORAGE) #### S (WEB SERVICES) • SOAP (Simple Object Access Protocol) - a way for a program running in one kind of operating system (such as Windows 2000) to communicate with a progam in the same or another kind of an operating system (such as Linux) by using the Web's Hypertext Transfer Protocol (HTTP)and XML as the mechanisms for information exchange. • SQL (Structured Query Language) - the most popular language for adding, accessing, and processing data in a database #### SaaS-based LDAP ### Learn the Benefits of a SaaS-based LDAP By: JumpCloud As an IT admin you like the control that LDAP gives you over servers and IT applications. Unfortunately, like most admins, you dislike the amount of time required to install, configure, and manage a full LDAP implementation. Add in cloud infrastructure and the complexity level increases significantly. Download this new guide to learn how moving to a Directory-as-a-Service provides innovative organizations tighter security, reduced expenses, and increased agility. Don’t let the complexity of LDAP stop you from safely taking advantage of the cloud era. Get the knowledge you need to keep up with this quickly changing landscape. Please read the attached whitepaper. #### Sales Funnel ### Sales Funnel sales funnel, also called a purchase funnel, is the visual representation of a how a sale proceeds in a linear fashion from customer awareness to customer action. The funnel, which is sometimes referred to as a sales grinder, illustrates the idea that every sale begins with a large number of prospective customers and ends with a much smaller number of people who actually make a purchase. The number of levels assigned to a sales funnel will vary by company but generally, sales funnels are divided into four sections -- those who are aware of a company, those who have had contact with a company, those who have repeated contact with a company and those who have made a purchase. Companies use various metrics to analyze and score leads and prospects in the funnel in order to evaluate the success of their sales team. Examples include quantifying the value of every sales opportunity in the funnel, determining the optimal flow rate -- which refers to the average amount of time leads are in each stage of the funnel -- and evaluating the average percentage of deal closings, also known as the win rate. In today's Age of the Customer, the journey a customer takes is less likely to be linear. For that reason, some experts maintain that the traditional sales funnel is obsolete. Others contend that the sales funnel is still a valuable tool as long as marketing and sales teams understand two things -- that today's qualified sales lead may enter the funnel closer to the bottom than they would have ten years ago and that marketing's role is changing. In the past, finding leads (the top -- and broadest part of the funnel) was typically the responsibility of marketing departments while sales was responsible for nurturing leads and guiding prospects through the sales funnel. Today, a successful company relies on both sales and marketing to guide the customer through the sales funnel and build customer loyalty, taking advantage of content marketing, customer data analytics and the two-way communication that social media marketing provides. #### "The sales funnel -- that inverse-pyramid-shaped image that depicts the pool of prospects that marketers are supposed to entice then shunt over to sales -- has become a key tool in nurturing prospects, then converting them into customers." - Lauren Horwitz RELATED: MORE: Salesforce Analytics Cloud gives the sales funnel a B-12 shot Sales and marketing are known for misalignment. Here's how two companies use the Salesforce Analytics Cloud to come together and fix the sales funnel. How marketers are reining in the sales funnel process Marketing teams can no longer rely on a linear, sequential sales funnel process. Can sales funnel management tools harness erratic customer journeys? Tactics for fixing the sales funnel and finding ROI Many companies want ROI from the sales funnel, but they're still stuck treating it as a dumping ground for low-value leads. Find out how to turn that around. Sales-marketing alignment fuels successful account-based marketing Account-based marketing is taking the industry by storm. Find out if this strategy is the right fit for your business. Can predictive analytics make sales funnel management work? Better sales funnel management is core to company growth and sales efficiency. How can predictive analytics help sales teams get there? Expert Steve Robins has insights. 500+ Twitter Ads Examples to get inspired The best advertisers are those that constantly try new ways to improve their performances. New designs, new audiences, new ads' copy. In this eBook you'll find 500+ real world Twitter Ads Examples to get inspiration from for your campaigns! #### Secure Digital Extended Capacity card (SDXC) ### Secure Digital Extended Capacity card (SDXC) Posted by: Margaret Rouse | Contributor(s): Stan Gibilisco Secure Digital Extended Capacity (SDXC) card is a very small flash memory card that resembles a SD (Secure Digital) card, but has far greater storage capacity. SD and SDXC cards make storage portable among devices such as smartphones, eBooks, digital cameras, camcorders, music players, and computers. The Extended Capacity (XC) format increases maximum SD storage capacity from the previous 32 GB (gigabytes) to 2 TB (terabytes), an increase of more than 60-fold. Engineers have attained a DTR (data transfer rate) of up to 312 Mbps (millions of bits per second) with SDXC devices. The XC technology was originally conceived for the camcorder market, but it also allows for greatly increased storage in general applications as well. A 2 TB SDXC memory card can store up to about 100 full-length movies, 480 hours of music, or 136,000 high-quality color photographs. SD and SDXC cards are provided by the SD Association.  Palabra(s) clave: SDXC #### Security Intelligence ### A Framework to Surface Cyber Threats via Security Intelligence by LogRhythm The Security Intelligence Maturity Model (SIMM) provides a systematic guide for an organization to assess and actively achieve a heightened security posture. Find out where your organization sits on the SIMM and identify gaps that need to be filled. Please read the attached whitepaper. #### Security Think Tank ### Security Think Tank: Control smart devices and apps like the rest of ICT by Mike Gillespie No device, system or protocol will ever be 100% secure 100% of the time. When we talk about managing and mitigating risk we assume that appetite and tolerance have been established and create our policies and procedures within those boundaries. This applies to individuals too, though they probably do not realise they are doing it. Every time they get the warning message before installing an app they make a decision about whether the level of access to their device – and therefore their information – is appropriate or not. They are making a choice between the risk to their data and the convenience of the app they want to use. Some may not take this very seriously and merely click through, allowing apps whatever access they request. These people may also not apply a similarly critical eye to establishing their device’s security, making a hack of their personal data – say photos – much easier to achieve. That is what we saw recently with the iCloud nude photo stories that seemed ubiquitous for a couple of weeks. It is for these reasons that we must control smart devices and the apps on them in the same way we have traditionally controlled the rest of our ICT infrastructure. But what does this mean for business? What can IT security teams do to minimise some of the risk from insecure apps and insecure cloud backup? There are a number of ways in which IT security teams can attempt to prevent users from unwittingly uploading sensitive corporate data to an insecure cloud back up service: 1. Ensure users receive regular security education, highlighting the issues related to storing data in the cloud. If the training is at a more personal level, they are more likely to remember it (for instance, use an example of the user storing personal data in the cloud and the impact of any leak or breach); 2. Drive forward a culture of individual accountability. Underpin this culture with a robust set of security policies that reinforces the message to users that any accidental or intentional release of information is their responsibility, and may result in some form of disciplinary procedure; 3. Wherever possible, minimise the risk of human error by restricting the ability to move data into a cloud environment only to appropriate users. This should be driven by their actual need to have this ability; 4. Introduce some form of "splash screen" notification that reminds users they may be about to upload sensitive information to an insecure cloud backup service. In other words, a polite reminder that what they are about to do could go against company policy; 5. Implement an in-depth protective monitoring policy, which would include a "word scan" program to block any email/document transfer out of the network if one of a selection of words is detected; 6. Secure the services of a reputable and trusted secure cloud service provider. This provider should be one that will welcome careful stipulations in your service level agreement, such as employee vetting, the right to audit, review of data sanitisation practices etc; 7. An extreme measure would be to prevent all users from directly uploading to a backup cloud service but to force channel through an IT department or IT provider, which would scrutinise any upload first and release to the cloud if the upload met a set of pre-defined authorisation conditions; 8. Review of devices following any operating system or application changes that invariably affect or neutralise security settings; 9. If you are concerned about the possible compromise of sensitive data, don’t backup to a cloud service provider; 10. Ensure policies, measures and procedures are understood and apply to all staff, including senior management and the board. These are the ones frequently overlooked or have a blind eye turned to their behaviour – but they are just as fallible as anyone else. A consistent approach is needed across an organisation and this will make your use of technology far more successful. The importance of contextualised education and refresher training is not to be underestimated. In this, as in all areas of security, be iterative, be vigilant – and be prepared to react to emerging threats. Mike Gillespie is director of cyber research and security at The Security Institute #### Seguridad de la Nube Privada ### Resguarde la seguridad de la nube privada con procedimientos y herramientas estrictos por Brad Casey Garantizar la seguridad de la nube privada comienza examinando la seguridad de la red en la que reside la nube. Dependiendo de la naturaleza de la nube privada específica, esto puede tomar muchas formas. Sin embargo, hay protocolos y controles comunes a la mayoría de las redes. El primer paso en el mantenimiento de la seguridad en su nube privada es la planificación por adelantado. Implemente protocolos y procedimientos para acceder a los datos en la nube privada en sus etapas de planificación. Si la nube solo está destinada a ser visitada internamente, claramente una empresa debe asegurarse de que estos servicios no se puedan acceder externamente. Pero si es necesario acceder a los recursos de la nube privada cuando los miembros del personal están fuera de la red de la empresa, decida cómo se protegerán los datos y ponga un mecanismo de autenticación. Además, determine qué restricciones –en su caso– se deben colocar sobre el acceso a los recursos. Si varias personas tienen acceso a los recursos, creando múltiples máquinas virtuales (VM) y ejecutando múltiples aplicaciones, la nube privada puede verse seriamente sobrecargada en términos de cómputo, amenazando su seguridad. Por lo tanto, planifique hacia adelante para mitigar este riesgo y hacer cumplir sus protocolos. Al construir una nube privada, además de o en lugar de una nube pública, asegúrese de que su empresa tiene el personal de seguridad para mitigar los riesgos. El personal que estará asegurando el entorno debe estar preparado para responder en consecuencia durante eventos catastróficos. #### Pruebe la seguridad de su nube privada Comience por realizar capturas periódicas de Wireshark o TShark en las máquinas físicas que albergan la infraestructura virtualizada. Una vez que los administradores tienen una idea general sobre qué tipos de tráfico deben y no deben estar entrando o saliendo de la red, pueden fácilmente escribir comandos sobre esto. Es también una buena manera de desarrollar una línea de base con respecto a lo que es el comportamiento normal de la red. Por ejemplo, si los administradores de red saben que no existe ningún servidor DHCP en su nube privada, y sin embargo empiezan a ver mensajes "DHCP OFFER" que aparecen en una captura de Wireshark, es crucial que investiguen más a fondo. Al utilizar Wireshark dentro de un entorno de nube privada, asegúrese de que la captura se realiza desde un máquina host. Esto permitirá una captura más exhaustiva del tráfico de la red, en lugar de simplemente capturar el tráfico desde dentro de una máquina virtual. Además, realice auditorías frecuentes de los registros del sistema, ya que pertenecen al entorno de nube privada. Hay numerosos dispositivos de hardware y aplicaciones de software que realizan análisis de registro automatizado robustos, completos con mensajes de alerta y disparadores de alarmas. Por ejemplo, si un individuo está ingresando a la nube privada a las 2 de la mañana de un sábado, esto podría ser considerado irregular por un sistema automatizado y registrado como tal. Sin embargo, estos sistemas son solo tan buenos como las personas que los crearon y nunca pueden sustituir por completo a un par experimentado de ojos humanos que saben lo que están buscando. Por lo tanto, se le debe permitir a un profesional experimentado que está cómodo realizando auditorías realizarlas de manera frecuente. #### ¿Merece la pena moverse a la nube pública? Muchas organizaciones se están moviendo a la nube pública porque la descarga del costo y la responsabilidad de mantener su propia infraestructura de nube se consideraba que bien valía la pena su tiempo y dinero. Sin embargo, ¿es el mejor movimiento para la seguridad? Bueno, sí y no. Muchas empresas se sienten menos vulnerables a los DoS y otros ataques debido a que su infraestructura reside en, por ejemplo, uno de los centros de datos masivos de Amazon Web Services. El proveedor es responsable si la infraestructura de una organización es víctima de un ataque. Sin embargo, la empresa sería responsable de llamar a los administradores de sistemas y redes durante el fin de semana, y dedicar grandes cantidades de tiempo y recursos a mitigar un ataque a una nube privada. Ventaja: la nube pública. Por otro lado, las empresas que decidan trasladarse a la nube pública tienen muy poca –si es que tienen alguna– idea de dónde residen los datos y cómo se están tratando. Cuando una empresa utiliza una nube pública, no tiene acceso de root a la máquina física donde reside. Por lo tanto, los individuos nefastos con acceso de raíz a una caja determinada pueden causar estragos en los datos de una empresa. Por ahora, todavía hay pros y contras para ambas nubes públicas y privadas. Sobre el autor: Brad Casey es un antiguo experto de SearchSecurity.com. Posee una Maestría en Ciencias en Aseguramiento de la Información por la Universidad de Texas en San Antonio, y tiene una amplia experiencia en las áreas de pruebas de penetración, infraestructura de clave pública, VoIP y análisis de paquetes de red. También tiene conocimiento en los ámbitos de administración de sistemas, Active Directory y Windows Server 2008. Pasó cinco años haciendo pruebas de evaluación de seguridad en la Fuerza Aérea de Estados Unidos, y en su tiempo libre puede encontrarlo viendo capturas de Wireshark y jugando con diferentes distribuciones de Linux en máquinas virtuales. #### Self-Service Business Intelligence (BI) ### Self-Service Business Intelligence (BI) Posted by Margaret Rouse Self-service business intelligence (SSBI) is an approach to data analytics that enables business users to access and work with corporate data even though they do not have a background in statistics, business intelligence or data mining. Allowing end users to make decisions based on their own queries and analyses frees up the organization's business intelligence (BI) and information technology (IT) teams from creating the majority of reports and allows them to focus on other tasks that will help the organization reach its goals. Because self-service BI software is used by people who may not be tech-savvy, it is imperative that the user interface (UI) for BI software be intuitive, with a dashboard and navigation that is user friendly. Ideally, training should be provided to help users understand what data is available and how that information can be used to make data-driven decisions to solve business problems, but once the IT department has set up the data warehouse and data marts that support the business intelligence (BI) system, business users should be able to query the data and create personalized reports with very little effort. While self-service BI encourages users to base decisions upon data instead of intuition, the flexibility it provides can cause unnecessary confusion if there is not a data governance policy in place. Among other things, the policy should define what the key metrics for determining success are, what processes should be followed to create and share reports, what privileges are necessary for accessing confidential data and how data quality, security and privacy will be maintained. #### Continue Reading About self-service business intelligence (BI) #### Semi-Structured Data ### Semi-Structured Data Posted by: Margaret Rouse Semi-structured data is data that has not been organized into a specialized repository, such as a database, but that nevertheless has associated information, such as metadata, that makes it more amenable to processing than raw data. The difference between structured data, unstructured data and semi-structured data: Unstructured data has not been organized into a format that makes it easier to access and process. In reality, very little data is completely unstructured. Even things that are often considered unstructured data, such as documents and images, are structured to some extent. Structured data is basically the opposite of unstructured: It has been reformatted and its elements organized into a data structure so that elements can be addressed, organized and accessed in various combinations to make better use of the information. Semi-structured data lies somewhere between the two. It is not organized in a complex manner that makes sophisticated access and analysis possible; however, it may have information associated with it, such as metadata tagging, that allows elements contained to be addressed. Here's an example: A Word document is generally considered to be unstructured data. However, you can add metadata tags in the form of keywords and other metadata that represent the document content and make it easier for that document to be found when people search for those terms -- the data is now semi-structured. Nevertheless, the document still lacks the complex organization of the database, so falls short of being fully structured data. In reality, there is considerable overlap between the boundaries of the three categories, which are sometimes described collectively as the data continuum. Chris Selland explains the big data continuum: #### Server Hardware Degradation Software to self-diagnose the replacement timing of server power-supply units ### Server Hardware Degradation #### Server hardware degradation is the gradual breakdown of the physical parts of a server. There are several general areas where server degradation problems occur including power, temperature, management and memory. The electric components inside servers age over time, and heat sinks and fans get clogged with dust, reducing the server’s efficiency and performance. Server lifecycle management aims to mitigate the effects of hardware degradation by considering how and when servers should be replaced. Previously, IT teams would swap aging servers for new ones about every three years to avoid hardware failure. In the age of widely adopted server virtualization, though, server hardware often stays in production much longer. Clustering technologies, virtualizationfeatures like live migration and improvements in hardware itself are all contributing toward servers living longer than ever. With the possibility of added server longevity, server hardware maintenance becomes more important. See also: graceful degradation #### Continue Reading About server hardware degradation #### Related Terms #### Serverless Computing (Function as a Service) ### Serverless Computing (Function as a Service) Posted by: Margaret Rouse Serverless computing is an event-driven application design and deployment paradigm in which computing resources are provided as scalable cloud services. In traditional application deployments, the server’s computing resources represent fixed and recurring costs, regardless of the amount of computing work that is actually being performed by the server. In a serverless computing deployment, the cloud customer only pays for service usage; there is never any cost associated with idle, down-time. Serverless computing does not eliminate servers, but instead seeks to emphasize the idea that computing resource considerations can be moved into the background during the design process. The term is often associated with the NoOps movement and the concept may also be referred to as "function as a service (Faas)” or “runtime as a service (RaaS)." One example of public cloud serverless computing is the AWS Lambda service. Developers can drop in code, create backend applications, create event handling routines and process data – all without worrying about servers, virtual machines (VMs), or the underlying compute resources needed to sustain an enormous volume of events because the actual hardware and infrastructure involved are all maintained by the provider. AWS Lambda can also interact with many other Amazon services, allowing developers to quickly create and manage complex enterprise-class applications with almost no consideration of the underlying servers. #### Shadow App ### Shadow App Posted by: Margaret Rouse A shadow app is a software program that is not supported by an employee's information technology (IT) department. In the past, shadow apps were often installed locally by impatient employees who wanted immediate access to software without going through normal corporate channels. With the growth of software-as-a-service (SaaS) and cloud computing, however, the meaning has expanded to include third-party consumer software that is accessed over the Internet. Skype, Lucidchart, Dropbox, Google Spreadsheets, Docusign and CloudOn are all popular shadow apps. Although many shadow apps can improve productivity and collaboration with little or no financial cost to the company, their use comes with risks. If an employee accesses a cloud app with his personal account, for example, corporate data may be put at risk or even lost if the employee leaves the company. Shadow apps can also cause bandwidth issues on the corporate network, slowing things down and impacting everyone's productivity. To prevent problems, an IT department should have a service audit process in place to inspect outbound packets and verify ownership of company-owned services in the cloud. The organization should also have policy in place that requires employees to use corporate accounts for web-based applications and restrict network privileges so end users cannot install software locally. If a large group of employees is using a particular cloud app, the IT department should consider providing the service in house and finally, the IT department should educate employees about the value of corporate data and the risks that shadow apps present. See also: shadow IT, rogue IT #### Related Terms #### Definitions • ##### Common Vulnerabilities and Exposures (CVE) - Common Vulnerabilities and Exposures (CVE) provides unique identifiers for publicly known security threats. (SearchFinancialSecurity.com) • ##### evil twin - An evil twin, in security, is a rogue wireless access point that masquerades as a legitimate hot spot. (SearchSecurity.com) • ##### hypervisor attack - A hypervisor attack can allow hackers to take control of your VMs. While numerous guest OS and network security vulnerabilities exist in a virtual environment, a successful hypervisor attack could ... (WhatIs.com) #### Glossaries • ##### Network security - Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls. • ##### Internet applications - This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ... #### Dig Deeper  Palabra(s) clave: Shadow App #### Siglas (PMI) • ACWP Actual Cost of Work Preformed (Costo Real de Trabajo Realizado) • AD Activity Description (Descripción de Actividad) • AF Actual Finish date (Fecha Real de Terminación) • BAC Budget at Completion (Presupuesto al Terminar) • CCB Change Control Board (Comité de Control de Cambios) • CPI Cost Performance index (Indice de Desempeño de Costos) • CPM Critical Path Method (Método de la Ruta Crítica) • DD Data Date (Fecha de Corte) • DU DUration (DUración) • EAC Estimate At Completion (Estimado al Terminar) • EF Early Finish date (fecha de Terminación Temprana) • ES Early Start date (Fecha de Comienzo Temprana) • EV Earned Value (Valor Ganado o devengado) • EVM Earned Value Management (Administración de Valor Devengado) • FS Finish-to-Start (Comienzo–a-Fin) • GERT Graphical Evaluation and Review Technique (Técnica de Revisión y Evaluación Gráfica) • LF Late Finish date (Fecha de Terminación Tardía) • MPM Modern Project Management (Administración de Proyectos Moderna) • PDM Precedence Diagramming Method (Método de Diagramación de Precedencias) • PERT Program Evaluation and Review Technique (Técnica de Revisión y Evaluación de Programas) • PMBOK® Project Management Body of Knowledge (Cuerpo de Conocimientos de la Administración de Proyectos) • PMI®S Project Management Information System (Sistema de información de la gerencia de proyecto • QC Quality Control (Control de Calidad) • RAM Responsibility Assignment Matrix (Matriz de Responsabilidad) • SOW Statement Of Work (Declaración de Trabajo) • TQM Total Quality Management (Administración de Calidad Total) • TS Target Start date (Fecha de Comienzo de la Meta) • WBS Work Breakdown Structure (Estructura de Desglose de Trabajo) Glosario en español #### Single pane of glass ### Single pane of glass A single pane of glass is a management console that presents data from multiple sources in a unified display. The glass, in this case, is a computer monitor or mobile device screen. An effective single pane of glass view serves as a starting point from which a corporate executive or system adiminstrator can get a sense of the big picture. For example, a data center software product that offers a single pane of glass might obtain data from building facility systems and integrate that information with data from information technology (IT) systems. The purpose of a unified display is to present operational data in a way that's easier to read and interpret. The phrase single pane of glass is often used as a synonym for dashboard. Features of an effective single pane of glass dashboard include: • An intuitive graphical user interface (GUI) that is thoughtfully laid-out and easy to navigate. • A logical structure behind the display that makes accessing current data easy and fast. • A display that can be customized and categorized to meet the end user’s specific needs. #### SINGULARITY UNIVERSITY Please see the link below:  Palabra(s) clave: SingularityUniversity #### SIP Trunking (Session Initiation Protocol trunking) ### SIP trunking (Session Initiation Protocol trunking) Posted by Margaret Rouse Session Initiation Protocol (SIP) trunking is the use of voice over IP (VoIP) to facilitate the connection of a private branch exchange (PBX) to the Internet. In effect, the Internet replaces the conventional telephone trunk, allowing an enterprise to communicate with fixed and mobile telephone subscribers worldwide. (SIP is an IETF standard for initiating interactive multimedia user sessions; a trunk is a line or link that can carry many signals at once, connecting major switching centers or nodes in a communications system.) In order to take advantage of SIP trunking, an enterprise must have a PBX that connects to all internal end users, an Internet telephony service provider (ITSP) and a gateway that serves as the interface between the PBX and the ITSP. One of the most significant advantages of SIP trunking is its ability to combine data, voice and video in a single line, eliminating the need for separate physical media for each mode. The result is reduced overall cost and enhanced reliability for multimedia services. With SIP trunking, subscribers can: • Initiate and receive local calls • Initiate and receive long-distance calls • Make emergency calls (911) • Access directory assistance • Use fixed and mobile telephone sets • Employ e-mail and texting • Browse the World Wide Web. #### Sistema operativo de red (NOS) ### Sistema operativo de red (NOS) Publicado por: Margaret Rouse Un sistema operativo de red (Network Operating System, o NOS) es un sistema operativo de computadora que está diseñado principalmente para soportar estaciones de trabajo, computadoras personales y, en algunos casos, terminales más antiguas que están conectadas en una red de área local (LAN). LANtastic de Artisoft, Banyan VINES, NetWare de Novell y LAN Manager de Microsoft son ejemplos de sistemas operativos de red. Además, algunos sistemas operativos multiuso, como Windows NT y OpenVMS de Digital, vienen con capacidades que les permiten ser descritos como un sistema operativo de red. Un sistema operativo de red proporciona compartición de impresoras, sistema de archivos comunes y uso compartido de bases de datos, uso compartido de aplicaciones y la capacidad de administrar un directorio de nombre de red, seguridad y otros aspectos de mantenimiento de una red. #### Términos relacionados #### Skills to Look for in IT Project Managers ### Skills to Look for in IT Project Managers Good IT project management can make or break key business initiatives, but finding top talent means identifying a unique mix of technical know-how and soft skills. Here are eight skills to look for when hiring project management professionals. #### Skills to Look for in IT Project Managers As the economy continues to climb out of recession, demand for project management professionals has skyrocketed. Finding the right project management talent for mission-critical IT projects can be difficult, as the role requires a unique mix of technical and soft skills. In addition to the usual suspects -- attention to detail, focus on process, time management and capability to multitask, for instance -- there are some less obvious, but equally crucial, skills that separate the good from the great. Here, our experts weigh in on what to look for when hiring IT project managers. #### Ability to Manage Resource Conflicts "No matter how big your business, no matter how large your company, you always have these kinds of resource allocation conflicts. You're always limited by costs, by technology constraints, by time and by personnel availability. The project managers who can decide how to best allocate limited resources to the projects that will have the greatest positive business impact are very valuable," says Tushar Patel, vice president of marketing at Innotas, a cloud-based project portfolio management solutions company. #### Familiarity With a Variety of Technical Platforms/Methodologies For IT project managers familiarity with the standard way in which software and applications are developed, designed, built and delivered is a necessary skill, says Patel. Nowadays, most IT organizations are using the agile development methodology, so that's an important framework to understand. "In the past, agile was only used by software development teams, but more than half of the companies we talk to today are applying the agile methodology to an increasing number of their technical projects. So, concepts like iteration, sprints, scrum, and how to translate changing requirements into end-user functionality based on customer feedback are some of the skills IT project managers must possess," says Patel. Of course, every organization interprets agile differently, so project managers must also understand how agile is used and applied in the organization they're working for. #### A Focus on Business Strategy and Agility A project management team that's focused on how projects contribute to a company's growth, innovation and the greater business strategy rather than simply on completing discrete tasks can give businesses can a major competitive advantage, says Patel. "Using agile concepts outside of the IT department to create business agility is critical for good project management," he says. "You want project managers to understand not just how to be responsive to customers and markets, but to do so even when your market changes, or your internal strategy changes; to do so if your company's acquired, if your company's acquiring another, getting a new CEO - any number of major changes. Project managers must be able to show they have the ability to turn on a dime. To manage the business' priorities in the face of sweeping change," Patel says. It used to be enough that businesses were quick to react when markets changed, but nowadays, project managers must be proactive and anticipate every possible change and shift that could happen and how those could affect not just their projects, but their business as a whole, he says. "One of the traits we're evangelizing is being predictive - forecasting the need to be flexible and adaptive; planning staffing, costs, time constraints and the like as much as six months out and determining which projects will be the key to success then," he says. "It's not easy, for sure, but this is something good project managers must do." #### Excellent Communication Skills Communication is obviously a must-have when hiring project management talent, according to Hallie Yarger, regional recruiting director, Midwest region for Mondo, a digital marketing and tech talent sourcing and consulting firm. Project managers must be able to reach people from all different backgrounds, with all different personalities, and to be able to quickly and concisely inform employees, executives, customers and all other stakeholders about the status of the project. "Communication skills are a no-brainer for PMs, but the key is that these skills be multi-dimensional, touching on both internal and external stakeholders," says Yarger. #### Management Skills Hand-in-hand with communication skills are management skills. Project managers must be able to navigate tough situations and make difficult decisions based on the needs of the business without being political. Being able to understand and empathize with stakeholders that may have different viewpoints, personalities, communication styles and needs is difficult when projects are going smoothly -- being able to do so in times of crisis is incredibly valuable for a project manager. "You almost have to have a little bit of a psychology background to figure out how to effectively motivate, push and cajole each person involved to make sure projects are completed on time and with a minimum of conflict," Yarger says. #### Ability to Accurately Assess Risk "With every IT project, there are risks involved", says Yarger. Risks that resources are allocated to certain projects and not others, risk that projects will not meet the expectations and standards set by clients and stakeholders, risks that deadlines will be missed and projects won't be delivered on time. However, a good project manager should be able to assess and mitigate all these by prioritizing the value of each asset, while minimizing the risk of project failures by ensuring the right team members have the tools, knowledge and information they need. #### Speaking the Right Language Especially in IT, trust is a key factor in establishing rapport as a project manager. Software developers, in particular, can be a finicky bunch, according to Yarger, so it's crucial to find project management professionals with the street cred to manage and motivate developers. "You have to find someone with whom software developers will gladly work and who they will respect; someone who's familiar with the languages and platforms they're using, who knows the ins-and-outs of the software development lifecycle (SDLC), who understands their challenges and strengths - someone who can talk the talk and walk the walk," Yarger says. #### Global Experience or Vertical Experience Today's current global, digital economy means that some projects will be handled by teams in distinct geographical locations. Yarger points out that project managers with experience working with or managing offshore teams, or who've worked on projects in other countries are in especially high demand. "What our clients are demanding right now are project managers with global experience, as well as experience in verticals like healthcare -- especially EHR/EMR experience -- and finance, for issues like regulatory compliance," says Yarger. Link: http://www.cio.com #### SKW© (KW) Componente SKW© Definición 2003 La única diferencia entre un componente HKW y un SKW es que el segundo se crea a partir de uno o más componentes KW, en forma manual o automática a través de una "sinapsis". Definición Cuando el Usuario Final, utilizando su framework ya cargado con los componentes activos (HKW, DKW, SKW), invoca la acción "sinapsis" en el contexto deseado, es posible que el motor de inferencia del servidor KIP genere nuevo conocimiento con el formato de componentes SKW.  Palabra(s) clave: SKWSynapse Reusable Knowledge ComponentSinapsis #### Slack software ### Slack software Slack software is cloud-based collaboration software suite. Originally founded in 2009 as a chat tool for a now-defunct gaming technology, Slack has gained currency among enterprises and is broadening into a collaboration platform with capabilities beyond just messaging. Slack is designed to enable users to communicate easily and eliminate the "app fatigue" associated with using multiple communication applications. Slack is one of several online collaboration tools in the market, including Microsoft Teams, Sharepoint, YammerHipChatJiveiApple and Salesforce Chatter. The main critique of collaboration tools has been that they exist outside of the location where real work is accomplished -- forcing users to toggle between applications and making collaboration another time-consuming task. Slack features include direct-messaging capabilities, notifications and alerts, document sharing, group chat and search. Slack offers integration with many third-party services, including Google Drive and Dropbox, and it is especially popular with software developers and technology-driven companies because it supports source code snippets and retains formatting for a variety of programming languages. Slack also offers integration options for developer-oriented tools such as GitHub and application performance management services like New Relic. Slack for small teams is free with a limited range of capabilities. Slack also offers Standard, Plus and Enterprise licensing levels. Here's a snapshot of the Slack interface: #### Continue Reading About Slack software ### Slack vs. Microsoft Teams: Which is best for enterprise collaboration? #### While Slack came on the scene as a new enterprise collaboration tool, Microsoft Teams is swift on its heels and promises integration with Office 365. Which one makes more sense? The productivity tool Slack has taken the world by storm. The web-based enterprise collaboration platform has made its way into organizations of all kinds recently, and has made ad hoc teaming and communication a standard. Slack emerged as an answer to a crowded, but ineffective enterprise collaboration marketplace. While many tools had flooded the market by the time of Slack's launch in 2013 -- from Jive to SharePoint -- users remained frustrated by a lack of ease of use and a lack of integration between collaboration applications and the other apps they used for work. As a result, users often failed to use sanctioned collaboration tools, and even used their own rogue systems. When Slack came on the scene, it offered respite from this cycle of application fatigue and user revolt. Slack addressed usability problems and its users found it intuitive, easy to use, easy to work with in their native application environments and easy to build functionality from. But, of course, Slack is but one enterprise collaboration application, and it has largely stuck to its roots in collaboration and chat rather than having broader designs to add content management capabilities; it relies on third parties for those functions. So, too, while Slack is building out integrations with other providers, it doesn't lay claim to other business productivity functions, such as video chat, document management or integration with back-office tools like Excel, OneDrive for Business or social media. Enter Microsoft Teams, which is angling for Slack's role in the marketplace, while also offering a wider array of functionality. Which option makes more sense for enterprises? Let's compare them. #### Communications and enterprise collaboration functionality Slack and Teams share a primary mission: To facilitate collaboration in the enterprise through the ability to create spontaneous communications within ad hoc groups or between individuals. Slack and Teams both enhance chat from its former basic leanings, offering the ability to append documents, images, spreadsheets and other artifacts to collaborative discussions, and making team-based file storage available to facilitate project work. With both platforms, communications can be as broad as enterprise-wide and as limited as person-to-person. Between those two extremes, both platforms can restrict messages to subgroups within a group, as needed. Also, both feature configurable notifications to keep collaborative partners up to date on the latest messages. Both also enable the search of archived messages. One of Slack's breakout features (which helped drive its rise in adoption) is its smooth incorporation of social media: It is easily customizable for use in social media marketing, a use case that in itself makes Slack a stand-out platform. But Slack does not support threaded conversations -- email-style subdiscussions that help organize complex conversations that involve multiple participants. This void comes despite promises over the past year that this feature will soon be available. Teams offers this kind of capability and, in addition, offers in-line reply messaging -- another feature that adds structure to highly detailed dialogue -- which Slack does not. Winner: Teams #### Business productivity Any effective enterprise collaboration platform enhances productivity in an organization, saving time, eliminating confusion and organizing project resources for optimal team use. But it ends there for Slack, which is essentially a chat platform, rather than a source of business functionality. Teams, however, is part of the Office 365 platform, and offers deep integration with the platform's business functionality. Other O365 apps can be nested in Teams processes: Skype meetings, for instance, can be conducted from within Teams, and OneDrive is immediately accessible, adding both organization and integration to collaborative file usage. In addition, Teams is integrated with Office Graph, Microsoft's artificial intelligence functionality that underlies Office 365 and services like Delve, making collaboration in Teams a business process that can be tracked, evaluated and optimized. Winner: Teams #### Integration and operating system compatibility Integration with other platforms is always a core attribute for an application, but it has been the key to success or failure for collaboration apps. Slack took an early lead on application integration, tapping into other platforms (social media channels, in particular) and rolling out native iOS and Android apps. In addition, Slack offers easy communication beyond the enterprise -- for instance, when it's desirable to bring an outside vendor or consultant into a dialogue or project -- because Slack is stand-alone. Moreover, it's cleanly integrated with Google Docs and Dropbox, further enhancing its file-sharing capabilities across distributed teams. In December, Slack partnered with Google to enable new functionality and integration, including features such as bots for notifications, support for Google's recently launched Team Drives, document previews, permissioning and more. Teams is also mobile-enabled, enabled for Mac OS and boasts easy access to platform-external data interfaces through O365's native integration capabilities, which are considerable. But cross-platform user interfaces are fundamentally limited, even among Microsoft users: To be part of a Teams team, users must be using not only O365, but also one of the pricier Business versions of the platform. Beyond this limitation, Teams is attracting plug-in development from other business platforms, such as Hootsuite, Asana and Zendesk, but it is still playing catch up. Winner: Slack #### Ease of use Another critical feature of Slack is its user experience; it is exceptionally clean, simple and clear, and this has fueled its enthusiastic uptake. Teams looks and functions a lot like Slack, but has the parallel challenge of maintaining the UI look and feel of Microsoft's Office products. While very similar to Slack, and certainly not unclear, it seems cluttered by comparison. While some may fault Teams for its clunkier UI, this may not be fair. The bottom line is its integration of so many partner tools makes it best in class in terms of productivity -- but it also makes it necessarily somewhat clunkier to use and a less seamless experience for the user. Winner: Slack #### Price Pricing models for Slack and Teams are quite different, which makes comparison difficult. Slack comes in three flavors: Lite, Standard and Plus. Lite is free and supports unlimited contacts; two-person calls, but no group calls; 5 GB file storage for a team; and limited search and app integrations. Standard is8 per user per month, supporting unlimited messages and integrations, 10 GB file storage per person, support for group calls, guest usage and usage statistics availability. Finally, Plus is \$15 per user per month with 20 GB file storage per person and 24/7 support.

Teams has no such scaled usage and is free for users of Office 365 Business Essentials, Office 365 Business Premium and the Enterprise E1, E3 and E5 plans. (It will also be made available to customers on the E4 plan before that plan it is phased out.)

Winner: Toss up, depending on various factors

(Note: Teams will be

in Q1 2017, but is currently available only as a trial.)

### Slicing the Big Data Analytics Stack

In this special report we have provided a deeper view into a series of technical tools and capabilities that are powering the next generation of big data analytics. From the pipes and platforms to the analytical interfaces and data management tools, we hope to help you develop a better ear to tune into the big data noise with. The goal is to empower you to make strong decisions in a noisy world of optionsall of which seem to promise similar end results.

 Palabra(s) clave: SlicingBig DataAnalyticsStack

### Software Asset Management: Pay Attention or Pay Up

There is a wide range of options for managing software assets, from in-house solutions to the cloud to managed services providers. Read this whitepaper to learn about:

• Using SAM to inform software investments
• Avoiding software fees and fines
• What's the best approach to SAM?Making the most of volume-based licensing
• Hands-free SAM: How vendors can unburden IT leaders