Top Stories

Meta Llama 4 explained: Everything you need to know
Meta released Llama 4 -- a multimodal LLM that analyzes and understands text, images, and video data. There are three primary versions of Llama 4 -- Scout, Maverick and Behemoth.

An explanation of pen testing
Pen testing uses six steps to test systems for vulnerabilities so organizations can remediate any problems and strengthen their cybersecurity against potential attacks.
Will AI replace jobs? 18 job types that might be affected
These 18 job types -- including administrative, customer service and teaching -- might be replaced, augmented or improved by the latest artificial intelligence wave.
Four tech companies eyeing nuclear power for AI energy
Big Tech's demand to power AI energy is driving a resurgence of nuclear power after years of skepticism. Nuclear power offers more reliable and cleaner energy for AI.
Browse Definitions By Topic
In-Depth Guides
-
What is quantum computing? How it works and examples
Quantum computing is an emerging area of computer science focused on building computers based on the principles of quantum theory to dramatically increase computation speeds.
-
What is ransomware? Definition and complete guide
Ransomware is malware that locks and encrypts a victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment.
-
What is IT automation? A complete guide for IT teams
IT automation is the use of instructions to create a clear, consistent and repeatable process that replaces an IT professional's manual work in data centers and cloud deployments.
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
-
Data storage management: What is it and why is it important?
Effective data storage management is more important than ever, as security and regulatory compliance have become even more challenging and complex over time.
New & Updated Definitions
-
What is data recovery?
Data recovery is the process of restoring data that has been lost, accidentally deleted, corrupted or made inaccessible. See More.
- What is data transformation? Definition, types and benefits
- What is assistive technology (adaptive technology)?
- What is a registration authority (RA)?
- What is infrastructure as code (IaC)?
- What is a quantum processing unit (QPU)?
- What is mobile platform as a service (MPaaS)?
- What is distributed tracing?
- What is quantum error mitigation?
Tech News
RSAC 2025 Highlights Gap Between Threat Intel, Response
Staying ahead means cyber defenders can’t operate in silos.
Independent lab crowns new WAAP product among its leaders
An API security specialist's newly launched WAAP product outranked more established WAF competitors during independent benchmark testing.
Ascension discloses multiple third-party data breaches
Over the course of the last year, Ascension Health has been hit with a storm of third-party data breaches impacting its patients across multiple ...
Veeam CEO discusses data resilience, VMware migrations, IPO
In this Q&A, Veeam CEO Anand Eswaran speaks to the customer pain point of VMware migrations, the potential for acquisitions and whether tariffs have ...