Top Stories
Quiet management explained: Everything you need to know
Tired of micromanaging? Quiet management empowers employees with autonomy, boosting productivity and morale. It's a trust-based approach that can work for many teams, but not all.
Women in tech statistics: The latest research and trends
In the tech sector, women still trail their male counterparts in terms of pay, leadership roles and representation.
Why your -- and everyone else's -- customer service stinks
Frustration with customer service teams isn't new. But there are some reasons why it is seemingly getting worse.
Binance money laundering scandal explained: What to know
CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.
Browse Definitions By Topic
In-Depth Guides
-
What is a cloud database? An in-depth cloud DBMS guide
A cloud database is an organized and managed collection of data in an IT system that resides on a public, private or hybrid cloud computing platform.
-
What is data backup? An in-depth guide
Data backup is the process of copying data in an IT system to another location so it can be recovered if the original data is lost.
-
What is IT/OT convergence? Everything you need to know
IT/OT convergence is the integration of information technology (IT) systems with operational technology (OT) systems.
-
Ultimate guide on enterprise unified communications strategy
When formulating a unified communications strategy, enterprises need to consider several key elements. This step-by-step guide helps businesses plan their UC deployment.
-
What is BCDR? Business continuity and disaster recovery guide
Business continuity (BC) and disaster recovery (DR) are closely related practices that support an organization's ability to remain operational after an adverse event.
-
What is DevOps? The ultimate guide
The word 'DevOps' is a combination of the terms 'development' and 'operations,' meant to represent a collaborative or shared approach to the tasks performed by a company's application development and IT operations teams.
New & Updated Definitions
-
risk-based vulnerability management (RBVM)
Risk-based vulnerability management (RBVM) is an approach to identifying and addressing security vulnerabilities in an organization's IT environment that prioritizes remediating vulnerabilities that pose the greatest risk. See More.
- social engineering penetration testing
- cloud infrastructure entitlement management (CIEM)
- PowerFlex (formerly ScaleIO)
- data anonymization
- Veeam Backup & Replication
- data center
- What are large language models (LLMs)?
- facial recognition
Tech News
Sprinklr's AI digital twin for CX emulates whole companies
Sprinklr CEO Ragy Thomas 'bets the company' on its moonshot digital twin technology that emulates a whole customer's organization, with AI assistance...
Google unveils new threat intelligence service at RSAC 2024
Google Threat Intelligence combines investigation findings from Mandiant with crowdsourced intelligence from VirusTotal and operationalizes the data ...
Judge overseeing Workday AI lawsuit has questions
Judge Rita Lin seeks clarity on Workday's liability in an AI lawsuit alleging hiring discrimination. The case may set a precedent for AI vendors' ...
Recorded Future observes 'concerning' hacktivism shift
At RSA Conference 2024, Recorded Future detailed alarming trends as nation-state attackers operate under the guise of hacktivism to cover real ...