Top Stories

Top 5 metaverse conferences in 2025
The metaverse offers businesses unique training and customer service opportunities. Here are some events where you can learn more about this immersive technology and how to use it.

7 U.S. tech policies to watch in 2025
The Trump administration is already enacting new tech policies, seeking to establish the U.S. as a global leader in AI development and innovation while reducing red tape on Big Tech.
Treasury Department hacked: Explaining how it happened
Another major cyberattack hit the U.S. Treasury, allegedly by Chinese state-sponsored hackers. Exploiting BeyondTrust software, they accessed sensitive unclassified documents.
How companies are tackling AI hallucinations
AI hallucinations can cause real damage, so leading tech companies use automated reasoning, new data sets and retrieval-augmented generation to reduce them.
Browse Definitions By Topic
In-Depth Guides
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
-
Data storage management: What is it and why is it important?
Effective data storage management is more important than ever, as security and regulatory compliance have become even more challenging and complex over time.
-
What is network management?
Network management is a multifaceted discipline that provides network administrators with the tools, protocols and processes to maintain and optimize network operations.
-
What is cloud migration? Your guide to moving to the cloud
Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
-
What is business intelligence (BI)? A detailed guide
Business intelligence, or BI, is a technology-driven data analysis process that helps an organization's executives, managers and workers make informed business decisions.
New & Updated Definitions
-
What is a rootkit?
A rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer or other system. See More.
- What is Alphabet Inc.?
- What is Kerberos and how does it work?
- What is a general ledger (GL)?
- What is a network node?
- What is a proxy server? Definition and use cases
- What is Telnet?
- What is a certificate authority (CA)?
- What is computer memory and what are the different types?
Tech News
Analysts: IBM-LzLabs suit a cautionary tale for IT buyers
A U.K. court ruled that an LzLabs subsidiary breached IBM license terms, a reminder to IT orgs to do careful research before choosing a vendor, ...
GenAI use cases show value, but pain points persist
While large companies are generating value in genAI use cases, others are struggling to find the same value.
Physicians decry ongoing Medicare payment cuts
The AMA criticizes Congress for allowing a fifth year of Medicare payment cuts, warning it threatens patient care and forces small practices to close.
Telehealth prescribing ups SUD risk among some ADHD patients
New research shows that telehealth prescribing of ADHD medications did not increase substance use disorder risks overall, except among 26-to-34-...