Top Stories

Skype alternatives for video conferencing
Learn about nine alternatives to video conferencing platform Skype that also offer video call capabilities, secure messaging, collaborative tools and other useful features.

6 AI nurse robots that are changing healthcare
AI nurse robots like AIREC, Moxi, PARO, Pepper, TUG and XENEX are transforming healthcare. Discover how they assist with nursing tasks and help address staffing shortages.
Top 10 most influential women in technology
While there are still fewer women than men in the science and technology industries today, the gap is closing. Here are some top women in tech of note.
The Great Detachment explained: Everything you need to know
During the Great Detachment, employees emotionally detach from their roles but do not leave them, which can harm businesses.
Browse Definitions By Topic
In-Depth Guides
-
DeepSeek explained: Everything you need to know
DeepSeek, a Chinese AI firm, is disrupting the industry with its low-cost, open source large language models, challenging U.S. tech giants.
-
SAP S/4HANA migration: A definitive guide
Moving a business to S/4HANA comes with major risks, yet it is also a real opportunity for digital transformation. Here's the information and best practices to ensure success.
-
Data storage management: What is it and why is it important?
Effective data storage management is more important than ever, as security and regulatory compliance have become even more challenging and complex over time.
-
What is network management?
Network management is a multifaceted discipline that provides network administrators with the tools, protocols and processes to maintain and optimize network operations.
-
What is cloud migration? Your guide to moving to the cloud
Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
-
What is business intelligence (BI)? A detailed guide
Business intelligence, or BI, is a technology-driven data analysis process that helps an organization's executives, managers and workers make informed business decisions.
New & Updated Definitions
-
What is security by design?
Security by design is an approach to software and hardware development that seeks to make systems as free of vulnerabilities and impervious to attack as possible through such measures as continuous testing, authentication safeguards and adherence to best programming practices. See More.
- What are logic gates?
- What is security automation?
- What is product as a service?
- What is data curation?
- What is mobile device management (MDM)?
- What is pipelining?
- What is Nvidia?
- What is a buffer overflow? How do these types of attacks work?
Tech News
The Sequoia Project launches pharmacy interoperability group
The Sequoia Project has launched a workgroup to drive pharmacy interoperability, welcoming 40 healthcare organizations as members last month.
BianLian ransom demand hoax circulates via snail mail
The FBI and AHA warned of a ransom demand hoax in which the sender, who communicates through physical letters, claims to be part of the BianLian ...
Process mining vendor Celonis sues SAP over data access
Celonis slaps SAP with a lawsuit over third-party access to data for its process mining applications.
Optum RX targets cuts to prior authorization for some meds
The move to scrap reauthorization for 80 prescription drugs will ultimately eliminate 10% of prior authorization requirements.