Browse Definitions :

Top Stories

Quiet management explained: Everything you need to know

Tired of micromanaging? Quiet management empowers employees with autonomy, boosting productivity and morale. It's a trust-based approach that can work for many teams, but not all.

Women in tech statistics: The latest research and trends

In the tech sector, women still trail their male counterparts in terms of pay, leadership roles and representation.

View All Learning Content

Why your -- and everyone else's -- customer service stinks

Frustration with customer service teams isn't new. But there are some reasons why it is seemingly getting worse.

Binance money laundering scandal explained: What to know

CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.

In-Depth Guides

View All In-Depth Guides

New & Updated Definitions

Tech News

Judge overseeing Workday AI lawsuit has questions

Judge Rita Lin seeks clarity on Workday's liability in an AI lawsuit alleging hiring discrimination. The case may set a precedent for AI vendors' ...

Recorded Future observes 'concerning' hacktivism shift

At RSA Conference 2024, Recorded Future detailed alarming trends as nation-state attackers operate under the guise of hacktivism to cover real ...

Splunk details Sqrrl 'screw-ups' that hampered threat hunting

At RSA Conference 2024, Splunk's David Bianco emphasizes that enterprises need revamped threat hunting frameworks to help with threat detection and ...

IBM study shows security for GenAI projects is an afterthought

IBM's survey of C-suite executives finds that 82% say trustworthy and secure AI are essential, but only 24% have a security component included in ...

Networking
  • net neutrality

    Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application ...

  • network scanning

    Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network ...

  • networking (computer)

    Networking, also known as computer networking, is the practice of transporting and exchanging data between nodes over a shared ...

Security
CIO
  • IT budget

    IT budget is the amount of money spent on an organization's information technology systems and services. It includes compensation...

  • project scope

    Project scope is the part of project planning that involves determining and documenting a list of specific project goals, ...

  • core competencies

    For any organization, its core competencies refer to the capabilities, knowledge, skills and resources that constitute its '...

HRSoftware
  • employee onboarding and offboarding

    Employee onboarding involves all the steps needed to get a new employee successfully deployed and productive, while offboarding ...

  • succession planning

    Succession planning is the strategic process of identifying and developing internal candidates to fill key organizational roles ...

  • recruitment

    Recruitment is the process of finding, screening, hiring and onboarding qualified job candidates.

Customer Experience
  • chatbot

    A chatbot is a software or computer program that simulates human conversation or "chatter" through text or voice interactions.

  • martech (marketing technology)

    Martech (marketing technology) refers to the integration of software tools, platforms, and applications designed to streamline ...

  • transactional marketing

    Transactional marketing is a business strategy that focuses on single, point-of-sale transactions.

Close