Top Stories

How U.S. tariffs are reshaping the tech landscape
The Trump Administration's tariffs levy a minimum 10% tax on global imports, heavily affecting tech industry supply chains.

An explanation of cyberattacks and their different forms
Cyberattacks are malicious attempts to breach computer systems. Types include phishing, ransomware and SQL injection. Prevention requires training, monitoring and encryption.
10 core steps in the semiconductor manufacturing process
Semiconductors bridge conductors and insulators, enabling precise control of electrical flow. This complex process creates the foundation of modern electronics.
Four tech companies increasing manufacturing in the U.S.
Tech companies are pledging to increase U.S. manufacturing by building new or expanding existing facilities as well as investing in research and development.
Browse Definitions By Topic
In-Depth Guides
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
-
Data storage management: What is it and why is it important?
Effective data storage management is more important than ever, as security and regulatory compliance have become even more challenging and complex over time.
New & Updated Definitions
-
What are SMART goals?
SMART is a best practice framework for setting goals that are specific, measurable, achievable, realistic and time-bound. See More.
- What is an emergency notification system?
- What is video conferencing?
- What is the Patient Protection and Affordable Care Act (PPACA, ACA or Obamacare)?
- What is image-based backup?
- What is virtual memory?
- What is PeopleSoft?
- What is private PaaS? How is it different from public PaaS?
- What is cloud asset management?
Tech News
2025 MedTech Breakthrough winners for healthcare payments
Waystar, Candid Health and TrustCommerce are among the winners of the 2025 MedTech Breakthrough Awards in the healthcare payments category.
Systemic gaps hinder cell and gene therapy adoption, access
Over 200 cell and gene therapy treatments could be FDA-approved by 2030, but adoption could lag due to structural barriers, limited infrastructure ...
Limited payer prescription drug coverage pinches patients
As payers limit prescription drug coverage, they are increasingly setting up restrictions like prior authorizations and step therapy.
News brief: AI security risks highlighted at RSAC 2025
Check out the latest security news from the Informa TechTarget team.