Browse Definitions :

Top Stories

Meta Threads explained: Everything you need to know

Meta Threads had record user sign-ups in its first week but needs to sustain engagement to challenge Twitter.

2023 year in review: Top tech business topics

2023 brought major tech innovations and controversies, proving that balancing innovation, ethics and regulation is crucial for a positive tech future.

View All Learning Content

7 ways AI could bring more harm than good

AI has the potential to cause harm in several ways -- including job displacement, lack of transparency and unintended biases.

Binance money laundering scandal explained: What to know

CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.

In-Depth Guides

View All In-Depth Guides

Tech News

Intel Core Ultra CPUs with neural processing runs AI on PCs

Intel's Core Ultra CPUs now contain embedded AI neural processing, which adds options for device manufacturers to divide demand for AI processes ...

Solix eyes data lakes as it builds out archive platform

Solix Technologies' latest Cloud Data Platform update focuses on archiving, sorting and storing customer data for data lake creation and, ultimately,...

Small language models an emerging GenAI force

Enterprises are unwilling to pay for large language models to accomplish simple business tasks with generative AI. They're looking at cheaper small ...

DOJ's long-term goals in Google antitrust case unclear

The DOJ faced off against Google this year in an antitrust trial, claiming that Google maintained an illegal monopoly over the online search and ...

Networking
  • edge device

    An edge device is any piece of hardware that controls data flow at the boundary between two networks.

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a network conversation by which ...

  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

Security
  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close