Top Stories
10 crucial interview questions for ERP job candidates in 2026
COOs and other C-suite leaders who work with ERP should ensure job candidates are being asked these interview questions to measure whether the person will succeed in an ERP role.
Intel's rise and fall: A timeline of what went wrong
Intel's dramatic decline highlights its struggle to compete in a rapidly evolving tech landscape, as its market value lags giants such as Nvidia and AMD.
35 cybersecurity statistics to lose sleep over in 2026
Here are 35 eye-opening cybersecurity stats -- on cybercrime, vulnerabilities, costs, careers and other trends -- for CISOs to consider while evaluating their 2026 security plans.
The history of semiconductors and the chip-making industry
Semiconductors are the building blocks of modern technology and are essential for innovation in the modern age.
Browse Definitions By Topic
In-Depth Guides
-
Agentic AI explained: Key concepts and enterprise use cases
Agentic AI refers to artificial intelligence systems that are capable of autonomous action and decision-making.
-
What is risk management? Importance, benefits and guide
Risk management is the process of identifying, assessing and controlling threats to an organization's capital, operations and financial performance.
-
Enterprise cybersecurity: A strategic guide for CISOs
CISOs and others responsible for safeguarding an organization's systems, networks and data need to manage day-to-day threats while also planning strategically for what's ahead.
-
AI in healthcare: A guide to improving patient care with AI
AI is permeating critical healthcare practices, from interpreting mammograms to discovering life-saving drugs, while surgically transforming hospital workflows.
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
New & Updated Definitions
-
What is automated machine learning (AutoML)?
Automated machine learning (AutoML) is the automated process that applies machine learning models to real-world problems. See More.
- What is a data scientist? What do they do?
- What is 5G New Radio (5G NR)?
- What is multi-access edge computing? Benefits and use cases
- What is 5G?
- What is a small cell in wireless networks?
- What is 6G? Overview of 6G networks & technology
- phase-locked loop (PLL)
- What is identity and access management? Guide to IAM
Tech News
HHS backed at-home cervical cancer screening. Will women use it?
Women still prefer in-office sampling, but at-home cervical cancer screening is preferred by traditionally underserved patients who might be behind ...
PII masking a differentiator for Aerospike's NoSQL database
By adding native protection of personally identifiable information, the vendor is simplifying system administration while simultaneously pushing the ...
GenAI drives $119B cloud revenue in Q4
Q4 cloud infrastructure service revenues reach $119.1 billion, bringing the 2025 total to $419 billion. See how much market share AWS, Microsoft and ...
The Sequoia Project releases best practices for patient data access
The Sequoia Project is seeking feedback on its draft best practices for reducing barriers to patient access to health data.
