Browse Definitions :

Top Stories

18 companies on stock exchange innovating in AI

Keep an eye on the AI innovators as the turbulent AI industry evolves.

34 AI content generators to explore in 2024

Artificially generated media continues to progress. Learn about the different types of media and content generators to check out in 2024.

View All Learning Content

A who's who of cybercrime investigators

Cybercrime investigations are more than just first response. Learn about the patchwork of organizations that work together to combat international cybercrime.

6 content moderation guidelines to consider

User-generated content can affect a company's reputation. Content moderation helps stop the spread of disinformation and unacceptable posts that can harm or upset others.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

The promise of CXL still hangs in the balance

With AI pushing at the limits of hyperscaler environments, CXL offers a way to alleviate the memory problem. But it still requires a killer app if ...

ADP deploys GenAI for payroll, HR customer service

ADP adopts GenAI to refine HR functions, targeting improved efficiency and upgrading HR to more advisory roles.

OpenAI intros text-to-video model Sora, challenges rivals

Sora can generate video from text. OpenAI is red teaming the technology and admits it has some weaknesses. The release is a natural progression of ...

Generative AI for enterprises: ADP, IKEA launch tools

The human capital management company and the retailer have taken different roads to GenAI deployment, but both enterprises aim to boost customer ...

  • firewall as a service (FWaaS)

    Firewall as a service (FWaaS), also known as a cloud firewall, is a service that provides cloud-based network traffic analysis ...

  • private 5G

    Private 5G is a wireless network technology that delivers 5G cellular connectivity for private network use cases.

  • NFVi (network functions virtualization infrastructure)

    NFVi (network functions virtualization infrastructure) encompasses all of the networking hardware and software needed to support ...

  • operational risk

    Operational risk is the risk of losses caused by flawed or failed processes, policies, systems or events that disrupt business ...

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

  • cyberterrorism

    Cyberterrorism is usually defined as any premeditated, politically motivated attack against information systems, programs, and ...

  • Risk Management Framework (RMF)

    The Risk Management Framework (RMF) is a template and guideline used by companies to identify, eliminate and minimize risks.

  • robotic process automation (RPA)

    Robotic process automation (RPA) is a technology that mimics the way humans interact with software to perform high-volume, ...

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with three-dimensional (3D)...

  • OKRs (Objectives and Key Results)

    OKRs (Objectives and Key Results) encourage companies to set, communicate and monitor organizational goals and results in an ...

  • cognitive diversity

    Cognitive diversity is the inclusion of people who have different styles of problem-solving and can offer unique perspectives ...

  • reference checking software

    Reference checking software is programming that automates the process of contacting and questioning the references of job ...

Customer Experience
  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...