Browse Definitions :

Top Stories

TikTok bans explained: Everything you need to know

The United States government takes aim at the viral video sharing application TikTok.

Tracking pixel vs. cookie: What's the difference?

While tracking pixels and cookies accomplish similar tasks, they work in different ways. Here's how.

View All Learning Content

10 notable zombie brands

Remember those nostalgic brands like Sears and Toys R Us? They might not be officially dead as they try to come back to life and become a zombie brand.

Quiet management explained: Everything you need to know

Tired of micromanaging? Quiet management empowers employees with autonomy, boosting productivity and morale. It's a trust-based approach that can work for many teams, but not all.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

US officials optimistic on AI but warn of risks, abuse

Federal government leaders at RSA Conference 2024 touted the benefits of AI pilot programs but also outlined how a variety of threat actors are ...

Slow Ansible Lightspeed adoption might reflect AI qualms

Customers with Ansible Lightspeed in pilots or production remain rare, as concerns about the risks of AI and the need to shore up a solid IT ...

Dell 'security incident' might affect millions

Dell notified customers that a company portal connected to customer data exposed orders, names and addresses, while reports indicate the data is now ...

OpenAI deepfake detector 'belated but welcome'

The GenAI vendor's image-identifying tool has been warmly received, though some say it's belated, with elections around the world this year. The ...

Networking
  • SD-WAN security

    SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across ...

  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

Security
  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • Pegasus malware

    Pegasus malware is spyware that can hack any iOS or Android device and steal a variety of data from the infected device, ...

  • risk-based patch management (RBPM)

    Risk-based patch management (RBPM) is an approach to implementing patches to fix software code that prioritizes patches that ...

CIO
  • strategic management

    Strategic management is the ongoing planning, monitoring, analysis and assessment of all necessities an organization needs to ...

  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

HRSoftware
  • digital HR

    Digital HR is the digital transformation of HR services and processes through the use of social, mobile, analytics and cloud (...

  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • succession planning

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close