Tech explainers
Read in-depth guides to the most important technologies affecting organizations and individuals.
-
An explanation of subnets
Subnets make networking manageable and ensure efficient communication. Without subnetting, sending emails, texts and documents would be significantly slower.
-
Social Security number data breach: What you need to know
An estimated 2.9 million Social Security numbers and other PII have been leaked onto the dark web in a National Public Data breach.
-
MAC address vs. IP address explained
MAC and IP addresses serve different roles in data transmission, differing in location, format and use.
-
An explanation of fishbone diagrams
Fishbone diagrams assist in root cause analysis to identify the core issue of a problem.
-
What is an endpoint protection platform (EPP)?
An endpoint protection platform (EPP) is a security technology that safeguards endpoint devices.
-
An explanation of Industry 4.0 use cases
Industry 4.0 can be used across a number of industries, including retail, food service and cybersecurity.
-
An introduction to Industry 4.0
Here are the basics of Industry 4.0 -- the fourth industrial revolution -- featuring AI, IoT and cloud technologies.
-
Explaining third-party cookies vs. tracking pixels
Websites personalize content using third-party cookies and tracking pixels but do so in different ways.
-
An explanation of centralized vs. decentralized finance
DeFi and CeFi manage cryptocurrency transactions in different ways. Here's how.
-
What is an embedded system?
An embedded system is a combination of computer hardware and software designed for a specific function.
-
An explanation of private 5G vs. Wi-Fi
Private 5G improves upon traditional cellular networks by catering to private networks, expanding accessibility beyond major carriers.
-
An explanation of serverless computing
Serverless computing simplifies app development by eliminating server management, streamlining coding for cloud platforms.
-
What is the Coalition for Secure AI (CoSAI)?
Coalition for Secure AI (CoSAI) is an open source initiative to enhance artificial intelligence's security.
-
Causes of IT outages explained
IT outages can be caused by utility disruptions, hardware faults, configuration errors and software faults.
-
12 types of endpoint security
With the rise of remote work, mobile devices and IoT, the traditional security perimeter extends beyond corporate networks, making endpoint security crucial for organizations.
-
An explanation of private cloud
Private clouds cater to a single organization, offering enhanced security and compliance, unlike multi-tenant public clouds.
-
Benefits and methods of load balancing
Load balancing ensures smooth network performance by distributing traffic equitably, enhancing scalability and adapting to dynamic IT landscapes.
-
An explanation of generative design
Generative design transforms the creation process across many fields and excels in generating unbiased, efficient designs.
-
An explanation of large language models
Large language models can be traced back to 1966 but are significantly more sophisticated today.
-
What is endpoint security? How does it work?
Endpoint security is the protection of endpoint devices against cybersecurity threats.
-
An explanation of prompt engineering
Prompt engineering is responsible for training AI language models to ensure accurate outputs in AI chatbots.
-
An explanation of romance scams (pig butchering)
Pig butchering is a scam that exploits virtual relationships to deceive and steal money.
-
An explanation of collaborative robots
Cobots are robotic arms equipped with sensors for manufacturing and assembly tasks. They also detect human presence for productivity enhancement.
-
An explanation of the CrowdStrike outage
A botched CrowdStrike update triggered a massive outage, affecting airlines, healthcare, banking and transit.
-
An explanation of Flipper Zero
Flipper Zero is both a tool for pen testers and a learning device for new hackers.
-
What is the blue screen of death (BSOD)?
The blue screen of death (BSOD) -- also known as a stop error screen, blue screen error, fatal error or bugcheck -- is a critical error screen that can be displayed by Microsoft Windows operating systems (OSes).
-
AT&T data breach: What's next for affected customers?
Another breach has affected millions of people -- this time it is AT&T customers. Learn more about this AT&T breach and what to do if you were part of this attack.
-
How to control Instagram's political content limits
Using echo chambers, Instagram political content is limited to accounts users engage with and follow.
-
An explanation of inception scores
Inception scores are a mathematical algorithm that measures the quality of AI-generated images.
-
WPA2 vs. WPA3
Wireless security has evolved from WEP to WPA protocols and play a pivotal role in safeguarding against cyberattacks.
-
An explanation of super apps
Super apps consolidate banking, shopping, transportation, email and food delivery into a single, versatile application.
-
5 examples of AI in the Olympics
The 2024 Olympics in Paris will use AI for judging accuracy, personalized recaps, security, logistics and enhancing athlete performance, aiming for a fairer and safer event.
-
What is NumPy? Explaining how it works in Python
NumPy is an open source mathematical and scientific computing library for Python programming tasks.
-
An explanation of bots
Bots are automated programs with varied roles. They can be both helpful and malicious.
-
An explanation of advanced vs. predictive analytics
Predictive analytics is a type of advanced analytics. Learn more in this video.
-
An explanation of the different types of AI
There are four main categories of AI -- reactive, limited memory, theory of mind and self-aware.
-
The CDK Global outage: Explaining how it happened
CDK Global was hit with a ransomware attack affecting thousands of U.S. auto dealerships. Keep reading to learn more about this attack and how it affected the industry.
-
tensor processing unit (TPU)
A tensor processing unit (TPU) is an application-specific integrated circuit (ASIC) specifically designed to accelerate high-volume mathematical and logical processing tasks typically involved with machine learning (ML) workloads.
-
An explanation of GPT-4o
GPT-4o is a multimodal large language model developed by OpenAI.
-
An explanation of CIA triad
In information security CIA stands for confidentiality, integrity and availability.
-
Data protection vs. data privacy vs. data security explained
Data protection, privacy and security all play critical roles in effective data management.
-
An explanation of Trojan horse
Trojan horses are a type of malware that can take control of your computer and even access your camera.
-
An explanation of AI buzzwords
Here are some simple explanations of common AI buzzwords.
-
An explanation of AI model collapse
Generative AI creates content quickly and accurately but faces the risk of model collapse.
-
An explanation of foundation models
The core of every generative AI chatbot -- such as ChatGPT, Bard and YouChat -- is the foundation model.
-
An explanation of Hugging Face
Hugging Face is a machine learning platform that provides the means to run and deploy AI in live applications.
-
Pros and cons of AI-generated content
Artificial intelligence is growing rapidly in the tech sector and assisting with various tasks such as creating images and generating content. However, it cannot do everything.
-
How do cybercriminals steal credit card information?
Cybercriminals have various methods at their disposal to hack and exploit credit card information. Learn what they are, how to prevent them and what to do when hacked.
-
The importance of compliance officers
Compliance officers ensure a company follows both its internal rules as well as external laws from the government.
-
Differences between conversational AI and generative AI
While both AI types often work together, conversational AI enables natural interaction with machines, while generative AI creates new content such as text and images.
-
OpenAI and Apple's partnership, explained
Apple and OpenAI have partnered to bring ChatGPT to Apple devices via Apple's generative AI program, Apple Intelligence, uniting two major forces in the tech industry.
-
An explanation of CLI, GUI and NUI
A natural user interface uses human gestures, spoken words or biometrics for interaction, reducing reliance on typing and programming. This video will compare NUIs to CLI and GUI.
-
Machine customers explained: Everything you need to know
In this fast-paced digital age, the concept of a machine customer has emerged, changing how businesses interact with their online platforms and services.
-
An explanation of gamification
Gamification integrates video game elements into nongame contexts such as business operations. It uses points, badges, levels and rewards to enhance engagement and motivation.
-
An explanation of Worldcoin
The Worldcoin cryptocurrency uses iris scans to create unique digital identities.
-
An explanation of rich communication services
In this video, TechTarget editor Tommy Everson talks about rich communication services.
-
AI lawsuits explained: Who's getting sued?
Authors, artists and others are filing lawsuits against generative AI companies for using their data in bulk to train AI systems without permission.
-
An explanation of vector search
Vector search is a multidimensional tool that represents words, sentences, images and audio as numbers across multiple dimensions.
-
An explanation of ICT
ICT is an umbrella term for all digital interaction technologies that, when combined, help people and organizations interact in the digital world.
-
History and evolution of machine learning: A timeline
Machine learning's legacy dates from the early beginnings of neural networks to recent advancements in generative AI that democratize new and controversial ways to create content.
-
Broadband infrastructure program explained: The details
With the $42.45 billion BEAD Program, each state will use allocated funds to connect all households to high-speed internet.
-
Hacking vs. spoofing: What's the difference?
While email, text and phone enable instant communication in a technology-driven world, they also expose individuals and companies to cyberattacks such as hacking and spoofing.
-
scope creep
Scope creep in project management is the gradual expansion of functions or adding features, functions or other deliverables beyond a project's original parameters.
-
The history of telephones explained
The telephone, once a marvel for the rich, became a household necessity. Now, mobile phones and web calls have relegated landlines to near-forgotten relics.
-
Anonymous browsing explained: What you need to know
Anonymous browsing, also known as private browsing or incognito mode, enables users to browse the internet without leaving a trail of online activities. Is it really anonymous?
-
data de-identification
Data de-identification is decoupling or masking data, to prevent certain data elements from being associated with the individual.
-
Why healthcare data is often the target of ransomware attacks
The healthcare industry relies heavily on IT systems. Sensitive patient data is valuable to hackers, leading to ransomware attacks that disrupt operations and endanger lives.
-
overfitting in machine learning
Overfitting in machine learning occurs when a model excessively fits the training data, capturing both relevant patterns and inconsequential noise, resulting in inaccurate predictions of new data.
-
An 11-step patch management process to ensure success
Following these steps will make patch management more reliable and less stressful and keep your software updated, largely bug-free and secure from cyberthreats.
-
SD-WAN security
SD-WAN security refers to the practices, protocols and technologies protecting data and resources transmitted across software-defined wide area network infrastructure.
-
TikTok bans explained: Everything you need to know
The United States government takes aim at the viral video sharing application TikTok.
-
Tracking pixel vs. cookie: What's the difference?
While tracking pixels and cookies accomplish similar tasks, they work in different ways. Here's how.
-
data protection authorities
Data protection authorities (DPAs) are public authorities responsible for enforcing data protection laws and regulations within a specific jurisdiction.
-
data anonymization
Data anonymization describes various techniques to remove or block data containing personally identifiable information (PII).
-
What are large language models (LLMs)?
A large language model (LLM) is a type of artificial intelligence (AI) algorithm that uses deep learning techniques and massively large data sets to understand, summarize, generate and predict new content.
-
Binance money laundering scandal explained: What to know
CEO Changpeng Zhao wanted Binance to be the world's largest cryptocurrency exchange; however, the U.S. filed criminal charges due to lax compliance and money laundering schemes.
-
FCC broadband labels explained: Everything you need to know
Similar to how a nutrition label details food content, the FCC now mandates labels for internet providers to clarify service details for consumers to improve transparency.
-
Bitcoin halving explained: Everything you need to know
Since its 2009 inception, bitcoin surged from $0 to a peak of $69,000 in Nov. 2021. To control supply, a halving event happens to limit mining rewards and slow bitcoin creation.
-
Apple lawsuit history explained
In March 2024, the DOJ filed a lawsuit against Apple, alleging its smartphone market monopoly. However, this isn't the first time Apple has seen legal action.
-
The evolution of television technology explained
Television's impact on global entertainment is profound and evolving with key milestones and advancements that shape its pivotal role in daily life.
-
Mixture-of-experts models explained: What you need to know
By combining specialized models to handle complex tasks, mixture-of-experts architectures can improve efficiency and accuracy for large language models and other AI systems.
-
Digital nomad visas: 28 destinations offering them
Digital nomad visas are becoming increasingly popular, as more and more people choose to work remotely.
-
35 cybersecurity statistics to lose sleep over in 2024
Here are 35 eye-opening cybersecurity stats from dozens of security experts -- on crime, jobs and trends -- to consider while developing your 2024 security plan.
-
Breaking down the cost of cloud computing in 2024
Cloud computing offers several financial pros and cons. Each major provider also has a unique payment structure determined by several different factors.
-
The Great Retirement Boom explained: What you need to know
Baby boomers are retiring en masse, leaving a labor shortage in the workforce and creating economic shifts. Here's what it means for businesses.
-
Cryptocurrency exchange-traded funds explained
Cryptocurrency evolved from a fiat alternative to speculative investment after the SEC's approval of spot Bitcoin ETFs. Discover ETF types, pros, cons and investor alternatives.
-
Silicon Valley Bank collapse explained: What you need to know
Not all banks cater to startup companies. Silicon Valley Bank specialized in the tech startup industry but was not prepared for a bank run as companies started burning more cash.
-
Starlab space station
Starlab is a commercial space station set to be deployed in low Earth orbit (LEO) by 2030.
-
model-based systems engineering (MBSE)
Model-based systems engineering (MBSE) uses models to share information across collaborators in the design, development, test and operation of complex systems.
-
AI washing explained: Everything you need to know
With hype comes the hucksters. Learn how companies exaggerate the involvement of AI in their products and services, and how to avoid falling for AI washing.
-
A who's who of cybercrime investigators
Cybercrime investigations are more than just first response. Learn about the patchwork of organizations that work together to combat international cybercrime.
-
20 free cybersecurity tools you should know about
Cybersecurity products can get pricy but there are many excellent open source tools to help secure your systems and data. Here's a list of some of the most popular with cyber pros.
-
Video guide to generative AI
Generative AI has the potential to revolutionize technology. Learn about popular interfaces such as ChatGPT, the future of generative AI and its effects on businesses.
-
Gaussian splatting
Gaussian splatting renders extremely high-quality images -- using numerous scans of an object -- that can then be viewed from any angle and explored in real time.
-
Types of bytes: Units of memory explained
Memory is built with basic units called bits and bytes. Understanding them unlocks efficient storage and helps master the digital landscape.
-
Vodcasting: Everything you need to know
Vodcasting, the rising star of video content, offers immersive content by blending audio and video for deeper engagement, community building and growth.
-
The history of USB: What you need to know
USB, developed in 1995, evolved from USB 1.0 to USB4 by 2019, introducing faster speeds, smaller connectors and USB-C standardization. Learn the history of this industry standard.
-
Meta Threads explained: Everything you need to know
Meta Threads had record user sign-ups in its first week but needs to sustain engagement to challenge Twitter.
-
2023 year in review: Top tech business topics
2023 brought major tech innovations and controversies, proving that balancing innovation, ethics and regulation is crucial for a positive tech future.
-
What does the 'G' in ESG mean?
ESG is a framework for evaluating a company's commitment to sustainability. Learn how the 'G' -- governance -- helps companies operationalize the other two components.