Browse Definitions :

Top Stories

Benefits of dark web monitoring

Dark web monitoring helps organizations stay ahead of cybersecurity threats by detecting proprietary data breaches, securing accounts and ensuring compliance.

19 of the best large language models in 2024

Large language models have been affecting search for years and have been brought to the forefront by ChatGPT and other chatbots.

View All Learning Content

What's going on with Nvidia stock and the booming AI market?

Nvidia's market value surpasses $1 trillion in 2023, fueled by the generative AI boom, rebounding tech sector and 239% stock growth in 2023. However, there may be challenges ahead.

An explanation of IoT

Every device connected to the internet has set systems to collect, send and act on data.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

Biden administration bans Kaspersky Lab products in US

The Biden administration announced a ban on Kaspersky Lab products inside the United States due to the antivirus vendor's ties with the Russian ...

Arista, Cisco, HPE answer AI infrastructure demand

Arista, Cisco and HPE are racing to seize a share of the promising GenAI infrastructure market. Cisco and HPE have computing, networking and software...

SolarWinds Serv-U vulnerability under attack

The Centre for Cybersecurity Belgium observed exploitation against CVE-2024-28995, a high-severity vulnerability in SolarWind's Serv-U file transfer ...

Phoenix SecureCore UEFI firmware bug affects Intel processors

Multiple Intel processors and hundreds of PC models are potentially vulnerable to a recently disclosed vulnerability in Phoenix SecureCore UEFI ...

  • personally identifiable information (PII)

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

  • zero-day vulnerability

    A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.