Browse Definitions :

Top Stories

Bitcoin halving explained: Everything you need to know

Since its 2009 inception, bitcoin surged from $0 to a peak of $69,000 in Nov. 2021. To control supply, a halving event happens to limit mining rewards and slow bitcoin creation.

What are the 5 Scrum values?

Scrum defines five key values: openness, courage, respect, focus and commitment. Here's why they are important.

View All Learning Content

6 common social media privacy issues

Social media usage continues to grow as people share posts, videos and photos. However, there are data privacy issues and risks with sharing on social media.

Apple lawsuit history explained

In March 2024, the DOJ filed a lawsuit against Apple, alleging its smartphone market monopoly. However, this isn't the first time Apple has seen legal action.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

Oracle expands generative AI across its CX applications

Oracle beefs up its Fusion Cloud Customer Experience applications with GenAI tools for users of its sales, field service, marketing and contact ...

Lenovo, AMD broaden AI options for customers

Lenovo is expanding its partnership with AMD to bring more options for servers and HCI devices aimed at AI. It also launched an AI advisory and ...

AtScale adds semantic layer support for AI, GenAI models

The vendor's new platform update centers around decision-making flexibility, collaboration and community, and includes a metadata hub along with ...

Critical CrushFTP zero-day vulnerability under attack

While a patch is now available, a critical CrushFTP vulnerability came under attack as a zero-day and could allow attackers to exfiltrate all files ...

Networking
Security
  • identity management (ID management)

    Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to ...

  • fraud detection

    Fraud detection is a set of activities undertaken to prevent money or property from being obtained through false pretenses.

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials -- for ...

CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • Workday

    Workday is a cloud-based software vendor that specializes in human capital management (HCM) and financial management applications.

  • recruitment management system (RMS)

    A recruitment management system (RMS) is a set of tools designed to manage the employee recruiting and hiring process. It might ...

  • core HR (core human resources)

    Core HR (core human resources) is an umbrella term that refers to the basic tasks and functions of an HR department as it manages...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

Close