Browse Definitions :

Top Stories

What's going on with Nvidia stock and the booming AI market?

Nvidia's market value surpasses $1 trillion in 2023, fueled by the generative AI boom, rebounding tech sector and 239% stock growth in 2023. However, there may be challenges ahead.

An explanation of IoT

Every device connected to the internet has set systems to collect, send and act on data.

View All Learning Content

5 marketing campaign failure examples

Apple aimed to showcase the new iPad's versatility. Instead, they faced backlash for a thoughtless ad that crushed dreams, marking a notable marketing failure.

An explanation of TCP/IP

These fundamental protocols make transferring data easier by focusing on both communication and transportation through different mediums.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

Actian goes to the edge with latest Zen database update

The data management and analytics vendor's embeddable database now includes streaming capabilities via support for Kafka and faster query times that ...

OpsRamp embraces automation for GenAI workloads

In this Q&A, Varma Kunaparaju, HPE OpsRamp lead, talks about soon-to-come platform updates, which include GenAI capabilities and building trust for ...

SUSE Rancher gears up amid VMware-Broadcom 'feeding frenzy'

SUSE Rancher bolsters its bid to capture users dissatisfied with Broadcom's changes to VMware with the acquisition of StackState and other updates to...

Zerto to add protection, migration for KVMs

Open source Linux virtual machines are the next replication and migration target for HPE's Zerto backup and recovery tools, complementing new ...

Networking
Security
  • zero-day vulnerability

    A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

  • malware

    Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server.

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close