Top Stories
11 ways to spot disinformation on social media
Social media disinformation is meant to be deceptive and can spread quickly. Here are some ways to spot it.
How to spot a card skimmer
Cybercrime isn't just online. Skimming scams are rising at ATMs, gas pumps and registers. Learn how to spot, avoid and respond to these hidden card-stealing devices.
Foundation models explained: Everything you need to know
Foundation models are large-scale, adaptable AI models reshaping enterprise AI. They hold promise, but face risks such as biases, security breaches and environmental impacts.
Intel's rise and fall: A timeline of what went wrong
Intel's dramatic decline highlights its struggle to compete in a rapidly evolving tech landscape, as its market value lags giants such as Nvidia and AMD.
Browse Definitions By Topic
In-Depth Guides
-
What is cloud migration? Your guide to moving to the cloud
Cloud migration is the process of moving data, applications or other business elements to a cloud computing environment.
-
What is business intelligence (BI)? A detailed guide
Business intelligence, or BI, is a technology-driven data analysis process that helps an organization's executives, managers and workers make informed business decisions.
-
What is public cloud? A definition and in-depth guide
A public cloud is a third-party managed platform that uses the standard cloud computing model to make resources, applications and services available on demand to remote users around the world.
-
A state-by-state guide to AI laws in the U.S.
In lieu of federal regulation, U.S. states are proposing and enacting AI laws of their own. This up-to-date breakdown by state can help the C-suite keep tabs on developments.
-
What is Microsoft Copilot? In-depth guide to versions and uses
Microsoft Copilot is an artificial intelligence (AI)-powered chat service that integrates with many other Microsoft applications and services to support user efficiency and productivity.
-
What is threat detection and response (TDR)? Complete guide
Threat detection and response (TDR) is the process of recognizing potential cyberthreats and reacting to them before harm can be done to an organization.
New & Updated Definitions
-
What is artificial superintelligence (ASI)?
Artificial superintelligence (ASI) is a hypothetical software-based system with intellectual powers beyond those of humans across a comprehensive range of categories and fields of endeavor. See More.
- What is OpenAI?
- What is a robo-advisor? Everything to know before using one
- What is AutoGPT? What you need to know
- What is Microsoft Azure and how does it work?
- What is artificial intelligence (AI) governance?
- What is the Gramm-Leach-Bliley Act (GLBA)?
- What is a CVO (chief visionary officer)?
- What is LangChain and how to use it: A guide
Tech News
Intel expands Core Ultra AI chips amidst market competition
PCs with Intel's new Core Ultra AI chips for gamers will hit the market starting in February. Previous Core Ultra releases targeted business PCs and ...
Nvidia's new model aims to move GenAI to physical world
Nvidia Cosmos is trained on hours of videos that focus on the physical world. It works with Nvidia Omniverse and advances LLM technology, the vendor ...
Pure Storage, Micron expand QLC NAND partnership
Micron and Pure focus on hyperscalers and AI workloads by bringing the latest generation of QLC NAND to Pure's storage hardware and software.
What's driving $4.9T in U.S. healthcare spending?
U.S. healthcare spending hit $4.9 trillion in 2023, growing 7.5%, driven by increased service use, federal aid expirations and rising private ...