Top Stories

Four tech companies increasing manufacturing in the U.S.
Tech companies are pledging to increase U.S. manufacturing by building new or expanding existing facilities as well as investing in research and development.

How U.S. tariffs are reshaping the tech landscape
The Trump Administration's tariffs levy a minimum 10% tax on global imports, heavily affecting tech industry supply chains.
80-plus common business abbreviations to know
Some common abbreviations and acronyms include PTO, SMART and WFH.
Intel's rise and fall: A timeline of what went wrong
Intel's dramatic decline highlights its struggle to compete in a rapidly evolving tech landscape, as its market value lags giants such as Nvidia and AMD.
Browse Definitions By Topic
In-Depth Guides
-
What is risk management? Importance, benefits and guide
Risk management is the process of identifying, assessing and controlling threats to an organization's capital, operations and financial performance.
-
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead.
-
AI in healthcare: A guide to improving patient care with AI
AI is permeating critical healthcare practices, from interpreting mammograms to discovering life-saving drugs, while surgically transforming hospital workflows.
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
New & Updated Definitions
-
What is PHI breach (protected health information breach)?
A PHI (protected health information) breach is unauthorized access, use or disclosure of individually identifiable health information that is held or transmitted by a healthcare organization or its business associates. See More.
- What is Microsoft SSIS (SQL Server Integration Services)?
- What is a SIM swap attack (SIM intercept attack)?
- What is an air gap backup? Strategy, benefits and use cases
- What is digital resilience? Definition, strategy and use cases
- What is fault management?
- Data backup explained: A comprehensive enterprise guide
- What is defragmentation?
- What is cloud-native backup and recovery?
Tech News
FDA begins publishing daily adverse drug reports for drugs, biologics
The FDA has begun releasing daily FAERS adverse event reports for all prescription drugs and biologics, enhancing post-market surveillance for ...
DaVita ransomware attack impacts 2.7M individuals
Dialysis provider DaVita suffered a ransomware attack that resulted in one of the largest breaches reported to federal regulators this year.
What's the best way to measure health-related social needs?
Research shows no system for measuring health-related social needs can capture every need, suggesting that organizations should leverage multiple ...
U.S.-EU trade framework caps pharma tariffs on branded drugs at 15%
A new U.S.-EU trade framework caps pharma tariffs at 15% for branded pharmaceuticals and places generics and their ingredients under the "...