Top Stories

An explanation of cyberattacks and their different forms
Cyberattacks are malicious attempts to breach computer systems. Types include phishing, ransomware and SQL injection. Prevention requires training, monitoring and encryption.

10 core steps in the semiconductor manufacturing process
Semiconductors bridge conductors and insulators, enabling precise control of electrical flow. This complex process creates the foundation of modern electronics.
Four tech companies increasing manufacturing in the U.S.
Tech companies are pledging to increase U.S. manufacturing by building new or expanding existing facilities as well as investing in research and development.
Finfluencers: A guide to personal financial content creators
Finfluencers create personal finance content on social media, often appealing to Gen Z and retail investors, but the lack of regulation means there are risks involved.
Browse Definitions By Topic
In-Depth Guides
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
-
Data storage management: What is it and why is it important?
Effective data storage management is more important than ever, as security and regulatory compliance have become even more challenging and complex over time.
New & Updated Definitions
-
What is OEM (original equipment manufacturer)?
An original equipment manufacturer (OEM) is a company that produces hardware or software that is later marketed and sold under another company's brand. See More.
- What is a security operations center (SOC)?
- What is Google Drive?
- What is Google Docs?
- What are the top 10 spyware threats?
- What is a capacitor (capacitance)?
- What is a change agent (agent of change)?
- What is the Joint Commission?
- What is 1000BASE-T (Gigabit Ethernet)?
Tech News
Nutanix platform may benefit from VMware customer unrest
Nutanix's Next 2025 conference attendees are jumping ship to the platform after Broadcom's VMware buy, as Nutanix executives plan enterprise-driven ...
Datadog acquisition gives it feature flagging for AI
It is the second acquisition the vendor has made in the last few weeks.
Nutanix CEO talks customer challenges and platform updates
Many customers are still looking for a VMware exit and need a modernized platform, Nutanix President and CEO Rajiv Ramaswami says in this Q&A with ...
Trump targets AI diffusion rule as big tech talks AI race
President Donald Trump will walk back a Biden-era rule restricting the sale of advanced U.S. AI chips and models in the month it's set to take effect.