Browse Definitions :

Top Stories

An explanation of GPT-4o

GPT-4o is a multimodal large language model developed by OpenAI.

An explanation of CIA triad

In information security CIA stands for confidentiality, integrity and availability.

View All Learning Content

Data protection vs. data privacy vs. data security explained

Data protection, privacy and security all play critical roles in effective data management.

An explanation of Trojan horse

Trojan horses are a type of malware that can take control of your computer and even access your camera.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

AI gateways emerge in response to governance concerns

Enterprise IT investment is pouring into AI, but security and governance remain major stumbling blocks to production. Enter API gateway vendors eager...

Teradata integrates with DataRobot to aid AI development

The partnership provides the data management and analytics vendor's users with more choice so that they can develop advanced models and applications ...

Druva expands threat hunting tools, services for backup

Threat hunting capabilities baked into the recovery process for Druva are now available as a separate feature for use on demand or as a managed ...

J.D. Vance is a Silicon Valley insider and tech policy critic

J.D. Vance's tech policy is likely to focus on bolstering competition with China while addressing perceived political biases amid big tech platforms ...

Networking
  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

Security
  • intrusion detection system (IDS)

    An intrusion detection system monitors (IDS) network traffic for suspicious activity and sends alerts when such activity is ...

  • cyber attack

    A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a digital document, message or...

CIO
  • product development (new product development)

    Product development -- also called new product management -- is a series of steps that includes the conceptualization, design, ...

  • innovation culture

    Innovation culture is the work environment that leaders cultivate to nurture unorthodox thinking and its application.

  • technology addiction

    Technology addiction is an impulse control disorder that involves the obsessive use of mobile devices, the internet or video ...

HRSoftware
  • organizational network analysis (ONA)

    Organizational network analysis (ONA) is a quantitative method for modeling and analyzing how communications, information, ...

  • HireVue

    HireVue is an enterprise video interviewing technology provider of a platform that lets recruiters and hiring managers screen ...

  • Human Resource Certification Institute (HRCI)

    Human Resource Certification Institute (HRCI) is a U.S.-based credentialing organization offering certifications to HR ...

Customer Experience
  • What is lead-to-revenue management (L2RM)?

    Lead-to-revenue management (L2RM) is a set of sales and marketing methods focusing on generating revenue throughout the customer ...

  • What is relationship marketing?

    Relationship marketing is a facet of customer relationship management (CRM) that focuses on customer loyalty and long-term ...

  • contact center burnout

    Contact center burnout refers to physical, emotional and mental exhaustion experienced by contact center employees.

Close